Lumma infostealer malware returns after law enforcement disruption

Lumma infostealer malware returns after law enforcement disruption

Lumma infostealer malware has resurged after a law enforcement operation that seized 2,300 domains, demonstrating the resilience of cybercriminal networks. Despite setbacks, Lumma quickly rebuilt its infrastructure and resumed operations using new hosting providers like Selectel. #LummaStealer #Infostealer #Selectel

Keypoints

  • Lumma malware operation recovered quickly after law enforcement seized its domains.
  • The malware’s infrastructure was rebuilt within weeks using alternative cloud providers, notably Selectel.
  • Lumma uses multiple distribution channels, including fake cracks, malvertising, compromised websites, and social media.
  • Distribution methods include fake CAPTCHA pages, GitHub repositories, and promoted cracked software on YouTube and Facebook.
  • Law enforcement actions alone do not deter the profitability and resilience of MaaS operations like Lumma.

Read More: https://www.bleepingcomputer.com/news/security/lumma-infostealer-malware-returns-after-law-enforcement-disruption/