Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Microsoft’s long and patient hunt for the Lumma Stealer malware finally paid off big

The malware targeted numerous applications including popular browsers like Chrome and Firefox gaming platforms such as Steam and Epic Games communication apps and password managers.

byKerem Gülen
May 23, 2025
in Cybersecurity, News
Home News Cybersecurity
Share on FacebookShare on TwitterShare on LinkedInShare on WhatsAppShare on e-mail

Microsoft and international law enforcement have executed a court-approved operation to dismantle Lumma Stealer, a widespread info-stealing malware that had infected over 394,000 Windows computers worldwide, with most cases reported in Brazil, Europe, and the U.S.

Microsoft has been tracking Lumma Stealer since June 2023, and considered it a significant threat. The company collaborated with Brazilian and German authorities, as well as the FBI, in the action against the malware operators.

Lumma’s code is based on the Bodhinder malware, and is sold as a service (MaaS) model. This enables novice cybercriminals to deploy the malware without extensive coding knowledge. Microsoft observed that the malware is priced between $75 and $500, depending on the features accessed.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

The malware targets numerous applications, including:

  • Browsers: Chrome, Firefox, Opera, Edge, and Brave.
  • Gaming platforms: Steam, Epic Games, and Discord.
  • Communication apps: Telegram, WhatsApp.
  • Password managers: KeePass
  • Cryptocurrency wallets: Various desktop and mobile wallets

Microsoft said the malware attempts to evade detection by employing various tactics, including:

  • Process injection into legitimate system processes.
  • Direct Kernel Object Manipulation (DKOM) to hide malicious code.
  • Encryption of configuration data.

The company detailed that they were able to disrupt the malware operations by analyzing the Lumma’s code and network traffic to identify and seize the command and control servers.

Microsoft and law enforcement have joined forces to dismantle Lumma, a widespread malware operation affecting over 394,000 Windows PCs worldwide, with a significant presence in Brazil, Europe, and the United States.

The collaborative effort resulted in a court-authorized action to seize 2,300 domains that acted as Lumma’s command and control servers, alongside five domains directly used by the operation. Microsoft initiated civil action to achieve this disruption, with support from the Justice Department, Brazilian, and German authorities, as well as the FBI.

Lumma is a password-stealing malware discovered on computers where users downloaded cracked games and applications. Upon infection, the malware harvests credentials, credit cards, and cryptocurrency wallets, subsequently selling this stolen information to cybercriminals. It also serves as a backdoor allowing hackers to deploy additional malware, even ransomware.

Microsoft has been tracking Lumma since June 2023, recognizing it as a considerable threat. The malware’s code is derived from Bodhinder and operates on a malware-as-a-service (MaaS) model, empowering less experienced cybercriminals to deploy it without deep coding expertise. Pricing ranges between $75 and $500, depending on the selected features.

The malware’s targets encompass a broad array of platforms and applications, including popular web browsers like Chrome, Firefox, Opera, Edge, and Brave, as well as gaming platforms such as Steam, Epic Games, and Discord. It also targets communication apps like Telegram and WhatsApp, password managers like KeePass, and various desktop and mobile cryptocurrency wallets.

To evade detection, Lumma employs a series of sophisticated techniques. These include process injection into legitimate system processes, Direct Kernel Object Manipulation (DKOM) to conceal malicious code, and encryption of configuration data.

Microsoft successfully disrupted the malware’s operations by thoroughly analyzing its code and network traffic, enabling the identification and seizure of its command and control servers.


Featured image credit

Tags: FeaturedMicrosoft

Related Posts

Amazon claims its new AI video summaries have “theatrical quality”

Amazon claims its new AI video summaries have “theatrical quality”

November 20, 2025
Google finally copies the best feature from Edge and Vivaldi

Google finally copies the best feature from Edge and Vivaldi

November 20, 2025
Perplexity launches free agentic shopping tool with PayPal

Perplexity launches free agentic shopping tool with PayPal

November 20, 2025
You should keep your Snapdragon 8 Gen 3 if you want to run emulators

You should keep your Snapdragon 8 Gen 3 if you want to run emulators

November 20, 2025
Netflix grabs the Home Run Derby in fifty million dollar baseball deal

Netflix grabs the Home Run Derby in fifty million dollar baseball deal

November 20, 2025
OpenAI says its new coding model can work for 24 hours straight

OpenAI says its new coding model can work for 24 hours straight

November 20, 2025

LATEST NEWS

Amazon claims its new AI video summaries have “theatrical quality”

Google finally copies the best feature from Edge and Vivaldi

Perplexity launches free agentic shopping tool with PayPal

You should keep your Snapdragon 8 Gen 3 if you want to run emulators

Netflix grabs the Home Run Derby in fifty million dollar baseball deal

OpenAI says its new coding model can work for 24 hours straight

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.