Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Microsoft’s long and patient hunt for the Lumma Stealer malware finally paid off big

The malware targeted numerous applications including popular browsers like Chrome and Firefox gaming platforms such as Steam and Epic Games communication apps and password managers.

byKerem Gülen
May 23, 2025
in Cybersecurity, News
Home News Cybersecurity

Microsoft and international law enforcement have executed a court-approved operation to dismantle Lumma Stealer, a widespread info-stealing malware that had infected over 394,000 Windows computers worldwide, with most cases reported in Brazil, Europe, and the U.S.

Microsoft has been tracking Lumma Stealer since June 2023, and considered it a significant threat. The company collaborated with Brazilian and German authorities, as well as the FBI, in the action against the malware operators.

Lumma’s code is based on the Bodhinder malware, and is sold as a service (MaaS) model. This enables novice cybercriminals to deploy the malware without extensive coding knowledge. Microsoft observed that the malware is priced between $75 and $500, depending on the features accessed.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

The malware targets numerous applications, including:

  • Browsers: Chrome, Firefox, Opera, Edge, and Brave.
  • Gaming platforms: Steam, Epic Games, and Discord.
  • Communication apps: Telegram, WhatsApp.
  • Password managers: KeePass
  • Cryptocurrency wallets: Various desktop and mobile wallets

Microsoft said the malware attempts to evade detection by employing various tactics, including:

  • Process injection into legitimate system processes.
  • Direct Kernel Object Manipulation (DKOM) to hide malicious code.
  • Encryption of configuration data.

The company detailed that they were able to disrupt the malware operations by analyzing the Lumma’s code and network traffic to identify and seize the command and control servers.

Microsoft and law enforcement have joined forces to dismantle Lumma, a widespread malware operation affecting over 394,000 Windows PCs worldwide, with a significant presence in Brazil, Europe, and the United States.

The collaborative effort resulted in a court-authorized action to seize 2,300 domains that acted as Lumma’s command and control servers, alongside five domains directly used by the operation. Microsoft initiated civil action to achieve this disruption, with support from the Justice Department, Brazilian, and German authorities, as well as the FBI.

Lumma is a password-stealing malware discovered on computers where users downloaded cracked games and applications. Upon infection, the malware harvests credentials, credit cards, and cryptocurrency wallets, subsequently selling this stolen information to cybercriminals. It also serves as a backdoor allowing hackers to deploy additional malware, even ransomware.

Microsoft has been tracking Lumma since June 2023, recognizing it as a considerable threat. The malware’s code is derived from Bodhinder and operates on a malware-as-a-service (MaaS) model, empowering less experienced cybercriminals to deploy it without deep coding expertise. Pricing ranges between $75 and $500, depending on the selected features.

The malware’s targets encompass a broad array of platforms and applications, including popular web browsers like Chrome, Firefox, Opera, Edge, and Brave, as well as gaming platforms such as Steam, Epic Games, and Discord. It also targets communication apps like Telegram and WhatsApp, password managers like KeePass, and various desktop and mobile cryptocurrency wallets.

To evade detection, Lumma employs a series of sophisticated techniques. These include process injection into legitimate system processes, Direct Kernel Object Manipulation (DKOM) to conceal malicious code, and encryption of configuration data.

Microsoft successfully disrupted the malware’s operations by thoroughly analyzing its code and network traffic, enabling the identification and seizure of its command and control servers.


Featured image credit

Tags: FeaturedMicrosoft

Related Posts

DJI Mini 5 Pro launches with a 1-inch sensor but skips official US release

DJI Mini 5 Pro launches with a 1-inch sensor but skips official US release

September 17, 2025
Google launches Gemini Canvas AI no-code platform

Google launches Gemini Canvas AI no-code platform

September 17, 2025
AI tool uses mammograms to predict women’s 10-year heart health and cancer risk

AI tool uses mammograms to predict women’s 10-year heart health and cancer risk

September 17, 2025
Scale AI secures 0 million Pentagon contract for AI platform deployment

Scale AI secures $100 million Pentagon contract for AI platform deployment

September 17, 2025
AI labs invest in RL environments for autonomous agents

AI labs invest in RL environments for autonomous agents

September 17, 2025
OpenAI researchers identify the mathematical causes of AI hallucinations

OpenAI researchers identify the mathematical causes of AI hallucinations

September 17, 2025

LATEST NEWS

DJI Mini 5 Pro launches with a 1-inch sensor but skips official US release

Google launches Gemini Canvas AI no-code platform

AI tool uses mammograms to predict women’s 10-year heart health and cancer risk

Scale AI secures $100 million Pentagon contract for AI platform deployment

AI labs invest in RL environments for autonomous agents

OpenAI researchers identify the mathematical causes of AI hallucinations

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.