Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    People are using Chatgpt to write their text messages – here are how you can tell

    August 5, 2025

    Certain bug leaked in proton log fixes the totup secrets

    August 5, 2025

    This app immediately blocks sensitive information from your MAC screenshot.

    August 5, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Lumma infostealer malware returns after law enforcement dissolution
    Security

    Lumma infostealer malware returns after law enforcement dissolution

    PineapplesUpdateBy PineapplesUpdateJuly 23, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Lumma infostealer malware returns after law enforcement dissolution
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Lumma infostealer malware returns after law enforcement dissolution

    The Lumma Infostealer Malware Operation is slowly resumed after a large -scale law enforcement operation in May, resulting in seizure of 2,300 domains and parts of its infrastructure.

    Although the Lumma Malware-AA-A-Service (MAAS) platform faced significant disruption from law enforcement action, as the report on the infostealer activity was confirmed in early June, it did not stop.

    Operators immediately accepted the situation on the XSS forums, but claimed that their central server was not seized (although it was erased from a distance), and the restoration attempts were already running.

    Lumma administrator's first message after law enforcement action
    Lumma administrator’s first message after law enforcement action
    Source: Trend Micro

    Gradually, MAAS rebuilt and gained confidence within the cyber crime community, and is now facilitating operating operations on many platforms again.

    According to trend micro analysts, Lumma has returned to almost pre-pre-activity levels, indicating rapid reconstruction of infrastructure with a cyber security firm’s telemetry.

    “After law enforcement action against Lumma Staller and its affiliated infrastructure, our team has seen obvious signs of revival in the operation of Lumma,” Trend reads micro report,

    “Network telemetry indicates that Lumma’s infrastructure began to re -ramps within the week of Techdown.”

    New Lumma C2 Domain Tracked by Trend Micro
    New lumma c2 domain
    Source: Trend Micro

    Trend Micro reports that Lumma still uses a valid cloud infrastructure to mask malicious traffic, but is now transferred from cloudflair to alternative providers, mostly to the Russian-based cellle, which is meant to avoid the takedown.

    Researchers have highlighted four distribution channels that Lumma currently uses to achieve new infections, indicating full-dominated for versatile targeting.

    1. Fake cracks/keigns: Fake software cracks and keygins are promoted through malwartizing and manipulated search results. The victims are directed to misleading websites that finger their system using the traffic detection system (TDS) before serving Lumma Downloader.
    2. Clickfix: The compromised websites display fake captcha pages that trick users to run the powershel command. These commands load Lumma directly into memory, which helps to avoid file-based detection mechanisms.
    3. Github: Attackers are actively making github repository with AI-bounded content advertising advertising advertisement fake game cheating ingredients. These repo host lumma payload, such as “tempspoofor.exe”, either in executable or zip files.
    4. YouTube/Facebook: Current lumma distribution also includes YouTube videos and Facebook posts that promote cracked software. These links host lumma malware to external sites, which sometimes misuse reliable services like reliable services.
    Multiple Github Repository (left) and youtube video (right) lumma distributing
    Malibly github repository (left) and youtube video (right) lumma payload
    Source: Trend Micro

    The re -emergence of Lumma as an important threat suggests that law enforcement action, devoid of arrest, or at least prosecution, is ineffective in stopping these prescribed danger actors.

    MAAS operations, such as Lumma, are incredibly profitable, and the leading operators behind them see law enforcement action as regular obstacles, they only have to navigate.


    Knowledgeable

    Include emerging hazards in real time – before they affect your business.

    Learn how cloud detection and response (CDR) gives security teams the required edge in this practical, no-nonsense guide.

    dissolution Enforcement infostealer law Lumma Malware returns
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleWhat are ‘trump accounts’? Breaking newborn savings accounts of large beautiful bills
    Next Article I replaced my Microsoft account password with a password – and you also need
    PineapplesUpdate
    • Website

    Related Posts

    Security

    Certain bug leaked in proton log fixes the totup secrets

    August 5, 2025
    Security

    Rainmware attacks: danger of developing US financial institutions

    August 5, 2025
    Security

    Anthropic AI wants to stop the model from evil – how is here

    August 4, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    People are using Chatgpt to write their text messages – here are how you can tell

    August 5, 2025

    Certain bug leaked in proton log fixes the totup secrets

    August 5, 2025

    This app immediately blocks sensitive information from your MAC screenshot.

    August 5, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.