Close Menu
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On

Google IO 2025 summary: 5 big announcements you’ll want to know

22 May 2025

NYT Crossword: answers for Wednesday, May 21

22 May 2025

I Tried Out Dyson’s New PencilVac. Here’s What You Need to Know

22 May 2025
Facebook X (Twitter) Instagram
Just In
  • Google IO 2025 summary: 5 big announcements you’ll want to know
  • NYT Crossword: answers for Wednesday, May 21
  • I Tried Out Dyson’s New PencilVac. Here’s What You Need to Know
  • Microsoft and DOJ deal crushing blow to Lumma malware empire
  • IVF Clinic Bombing Suspect Was Linked to ‘Anti-Life’ Ideology. Experts Fear Its Growing Influence
  • This Samsung TV is a home decor staple, and it’s $500 off
  • 13 Best Memorial Day Sales
  • Monster Train 2 stays on track with a safe, but tough sequel
Facebook X (Twitter) Instagram Pinterest Vimeo
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release
Subscribe
Best in TechnologyBest in Technology
Home » Authorities Carry Out Elaborate Global Takedown of Infostealer Heavily Used by Cybercriminals
News

Authorities Carry Out Elaborate Global Takedown of Infostealer Heavily Used by Cybercriminals

News RoomBy News Room22 May 20254 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email

Some infostealer operators bundle and sell this stolen data. But increasingly the compromised details have acted as a gateway for hackers to launch further attacks, providing them with the details needed to access online accounts and the networks of multibillion-dollar corporations.

“It’s clear that infostealers have become more than just grab-and-go malware,” says Patrick Wardle, CEO of the Apple device-focused security firm DoubleYou. “In many campaigns they really act as the first stage, collecting credentials, access tokens, and other foothold-enabling data, which is then used to launch more traditional, high-impact attacks such as lateral movement, espionage, or ransomware.”

The Lumma infostealer first emerged on Russian-language cybercrime forums in 2022, according to the FBI and CISA. Since then its developers have upgraded its capabilities and released multiple different versions of the software.

Since 2023, for example, they have been working to integrate AI into the malware platform, according to findings from the security firm Trellix. Attackers want to add these capabilities to automate some of the work involved in cleaning up the massive amounts of raw data collected by infostealers, including identifying and separating “bot” accounts that are less valuable for most attackers.

One administrator of Lumma told 404Media and WIRED last year that they encouraged both seasoned hackers and new cybercriminals to use their software. “This brings us good income,” the administrator said, referring to the resale of stolen login data.

Microsoft says that the main developer behind Lumma goes by the online handle “Shamel” and is based in Russia.

“Shamel markets different tiers of service for Lumma via Telegram and other Russian-language chat forums,” Microsoft’s Masada wrote on Wednesday. “Depending on what service a cybercriminal purchases, they can create their own versions of the malware, add tools to conceal and distribute it, and track stolen information through an online portal.”

Kela’s Kivilevich says that in the days leading up to the takedown, some cybercriminals started to complain on forums that there had been problems with Lumma. They even speculated that the malware platform had been targeted in a law enforcement operation.

“Based on what we see, there is a wide range of cybercriminals admitting they are using Lumma, such as actors involved in credit card fraud, initial access sales, cryptocurrency theft, and more,” Kivilevich says.

Among other tools, the Scattered Spider hacking group—which has attacked Caesars Entertainment, MGM Resorts International, and other victims—has been spotted using the Lumma stealer. Meanwhile, according to a report from TechCrunch, the Lumma malware was allegedly used in the buildup to the December 2024 hack of education tech firm PowerSchool, in which more than 70 million records were stolen.

“We’re now seeing infostealers not just evolve technically, but also play a more central role operationally,” says DoubleYou’s Wardle. “Even nation-state actors are developing and deploying them.”

Ian Gray, director of analysis and research at the security firm Flashpoint, says that while infostealers are only one tool that cybercriminals will use, their prevalence may make it easier for cybercriminals to hide their tracks. “Even advanced threat actor groups are leveraging infostealer logs, or they risk burning sophisticated tactics, techniques, and procedures,” Gray says.

Lumma isn’t the first infostealer to be targeted by law enforcement. In October last year, the Dutch National Police, along with international partners, took down the infrastructure linked to the RedLine and MetaStealer malware, and the US Department of Justice unsealed charges against Maxim Rudometov, one of the alleged developers and administrators of the RedLine infostealer.

Despite the international crackdown, infostealers have proven too useful and effective for attackers to abandon. As Flashpoint’s Gray puts it, “Even if the landscape ultimately shifts due to the evolution of defenses, the growing prominence of infostealers over the past few years suggests they are likely here to stay for the foreseeable future. Usage of them has exploded.”

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAnker Solix F3800 Plus review: the popular power station gets some upgrades
Next Article Monster Train 2 stays on track with a safe, but tough sequel

Related Articles

News

Google IO 2025 summary: 5 big announcements you’ll want to know

22 May 2025
News

NYT Crossword: answers for Wednesday, May 21

22 May 2025
News

I Tried Out Dyson’s New PencilVac. Here’s What You Need to Know

22 May 2025
News

Microsoft and DOJ deal crushing blow to Lumma malware empire

22 May 2025
News

IVF Clinic Bombing Suspect Was Linked to ‘Anti-Life’ Ideology. Experts Fear Its Growing Influence

22 May 2025
News

This Samsung TV is a home decor staple, and it’s $500 off

22 May 2025
Demo
Top Articles

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202494 Views

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 202486 Views

5 laptops to buy instead of the M4 MacBook Pro

17 November 202460 Views

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Latest News
News

This Samsung TV is a home decor staple, and it’s $500 off

News Room22 May 2025
News

13 Best Memorial Day Sales

News Room22 May 2025
News

Monster Train 2 stays on track with a safe, but tough sequel

News Room22 May 2025
Most Popular

The Spectacular Burnout of a Solar Panel Salesman

13 January 2025120 Views

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202494 Views

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 202486 Views
Our Picks

Microsoft and DOJ deal crushing blow to Lumma malware empire

22 May 2025

IVF Clinic Bombing Suspect Was Linked to ‘Anti-Life’ Ideology. Experts Fear Its Growing Influence

22 May 2025

This Samsung TV is a home decor staple, and it’s $500 off

22 May 2025

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Facebook X (Twitter) Instagram Pinterest
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact Us
© 2025 Best in Technology. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.