Microsoft says Lumma password stealer malware found on 394,000 Windows PCs

Microsoft and Law Enforcement Target Lumma Malware Operation

In a significant move against cybercrime, Microsoft, in collaboration with law enforcement agencies, has executed a court-sanctioned takedown of Lumma, a notorious info-stealer malware operation. This malware has infiltrated over 394,000 Windows PCs worldwide, with a notable concentration in Brazil, Europe, and the United States.

The tech giant initiated civil proceedings, prompting a federal court to authorize the seizure of 2,300 domains that functioned as the command and control servers for the Lumma network. In tandem, the Justice Department has also confiscated five additional domains integral to the operation of Lumma’s infrastructure.

Lumma is primarily disseminated through dubious games or cracked applications available for download on the internet. Once a user’s system is compromised, the malware swiftly extracts sensitive information, including logins, passwords, credit card details, and cryptocurrency wallets. This stolen data is then trafficked to other cybercriminals, amplifying the threat landscape. Furthermore, Lumma acts as a gateway for hackers, enabling them to deploy additional malicious software, such as ransomware.

The implications of password-stealing malware like Lumma extend beyond individual victims. Such operations have been implicated in extensive cyberattacks that target major tech companies, including PowerSchool and Snowflake, resulting in the theft of vast amounts of sensitive data.

Winsage
Microsoft says Lumma password stealer malware found on 394,000 Windows PCs