Microsoft and international law enforcement have successfully dismantled the Lumma Stealer malware operation, seizing over 2,300 domains and disrupting its command-and-control infrastructure. The operation targeted cybercriminals using Lumma to steal sensitive data, including passwords, credit cards, and cryptocurrency keys, highlighting the malware’s widespread impact and sophisticated delivery methods. #LummaStealer #CybercrimeOperation
Keypoints
- The takedown included the seizure of thousands of domains and the shutdown of Lumma’s central control panel.
- Microsoft’s Digital Crimes Unit sinkholed over 1,300 domains to protect victims and analyze traffic.
- Lumma Stealer is sold as a malware-as-a-service platform, targeting diverse browsers and crypto wallets.
- The malware collects personal, financial, and system data for resale or to facilitate ransomware attacks.
- The operation was led by a Russian developer known as “Shamel,” with tiered subscription prices and extensive distribution tactics.