Microsoft's global crackdown halts Lumma Stealer malware, which had infected 394,000 PCs
Microsoft's operation disabled Lumma Stealer malware, protecting 394,000 systems globally.

The Lumma Stealer malware, primarily developed by a Russian hacker known as "Shamel," was a sophisticated threat that infected over 394,000 PCs globally. It was primarily distributed through a malware-as-a-service model, offering cybercriminals the ability to extract sensitive data such as passwords, credit cards, and cryptocurrency wallets. The operation also targeted various applications, including VPNs and browser credentials. Microsoft's initiative, alongside global law enforcement agencies, has successfully dismantled this operation, significantly reducing the malware's reach and impact.
Microsoft's Digital Crimes Unit (DCU) spearheaded the mission to dismantle Lumma Stealer's infrastructure. Collaborating with a federal court in Georgia, Department of Justice, Europol, and Japan's Cybercrime Control Center, the DCU managed to disrupt the network that allowed the malware to operate. This collaboration led to the seizure and redirection of around 2,300 malign domains to Microsoft-controlled sinkholes, effectively preventing further damages and enabling cybercrime analysts to gain new insights.
The Lumma Stealer, operational since 2022, had evolved with sophisticated features enabling it to compromise various systems. It was distributed through several channels such as phishing emails, malvertising, and fake Captcha challenges, while some other malware also enabled Lumma's functionality. The malware was rented through underground markets, attracting a wide clientele due to its ability to collect metadata and siphon locale-saved data, document types, and cookies, among others.
Microsoft identified Shamel, the mastermind behind Lumma, as having maintained approximately 400 clients who used this malware for illicit activities. With the infrastructure compromised, these activities have been curtailed, leaving Shamel and his associates without a stable network to operate from. The efforts of Microsoft and its partners illustrate the importance of disrupting key tools of cybercriminal operations to impose significant setbacks on global cybercrime activities.
Following this crackdown, Microsoft has reiterated the importance of ongoing vigilance in cybersecurity, promoting the use of robust security measures such as updated antivirus programs and the latest Windows Defender tools. The collaboration between various global and local agencies has also been highlighted as a key factor in dismantling such widespread cyber threats, showcasing an excellent example of international cooperation in cybersecurity enforcement.
Sources: TechSpot, Microsoft Blog