Microsoft's global crackdown halts Lumma Stealer malware, which had infected 394,000 PCs

Microsoft's operation disabled Lumma Stealer malware, protecting 394,000 systems globally.

: Microsoft led a global effort to dismantle the Lumma Stealer malware network, which had compromised 394,000 Windows PCs. The Digital Crimes Unit worked with international law enforcement and the Department of Justice to achieve this, notably seizing 2,300 domains. Lumma Stealer, a malware-as-a-service product, stole sensitive information and disrupted services globally. The removal of its infrastructure has significantly reduced the threat, securing the systems and ending the cybercriminal's business.

The Lumma Stealer malware, primarily developed by a Russian hacker known as "Shamel," was a sophisticated threat that infected over 394,000 PCs globally. It was primarily distributed through a malware-as-a-service model, offering cybercriminals the ability to extract sensitive data such as passwords, credit cards, and cryptocurrency wallets. The operation also targeted various applications, including VPNs and browser credentials. Microsoft's initiative, alongside global law enforcement agencies, has successfully dismantled this operation, significantly reducing the malware's reach and impact.

Microsoft's Digital Crimes Unit (DCU) spearheaded the mission to dismantle Lumma Stealer's infrastructure. Collaborating with a federal court in Georgia, Department of Justice, Europol, and Japan's Cybercrime Control Center, the DCU managed to disrupt the network that allowed the malware to operate. This collaboration led to the seizure and redirection of around 2,300 malign domains to Microsoft-controlled sinkholes, effectively preventing further damages and enabling cybercrime analysts to gain new insights.

The Lumma Stealer, operational since 2022, had evolved with sophisticated features enabling it to compromise various systems. It was distributed through several channels such as phishing emails, malvertising, and fake Captcha challenges, while some other malware also enabled Lumma's functionality. The malware was rented through underground markets, attracting a wide clientele due to its ability to collect metadata and siphon locale-saved data, document types, and cookies, among others.

Microsoft identified Shamel, the mastermind behind Lumma, as having maintained approximately 400 clients who used this malware for illicit activities. With the infrastructure compromised, these activities have been curtailed, leaving Shamel and his associates without a stable network to operate from. The efforts of Microsoft and its partners illustrate the importance of disrupting key tools of cybercriminal operations to impose significant setbacks on global cybercrime activities.

Following this crackdown, Microsoft has reiterated the importance of ongoing vigilance in cybersecurity, promoting the use of robust security measures such as updated antivirus programs and the latest Windows Defender tools. The collaboration between various global and local agencies has also been highlighted as a key factor in dismantling such widespread cyber threats, showcasing an excellent example of international cooperation in cybersecurity enforcement.

Sources: TechSpot, Microsoft Blog