Close Menu
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On

Everything We Know About the Interstellar Object 3I/ATLAS

13 July 2025

Amazon Prime Day Sale 2025: Best Deals on Oppo Smartphones

13 July 2025

Amazon Prime Day Sale 2025: Best Deals On Gaming Laptops Under Rs. 80,000 in India

13 July 2025
Facebook X (Twitter) Instagram
Just In
  • Everything We Know About the Interstellar Object 3I/ATLAS
  • Amazon Prime Day Sale 2025: Best Deals on Oppo Smartphones
  • Amazon Prime Day Sale 2025: Best Deals On Gaming Laptops Under Rs. 80,000 in India
  • Review: Timekettle T1 Handheld Translator
  • Security News This Week: 4 Arrested Over Scattered Spider Hacking Spree
  • How to Use Clean Energy Tax Credits Before They Disappear
  • Gear News of the Week: Samsung’s Trifold Promise, Ikea’s Sonos Split, and Hugging Face’s New Robot
  • Future-Proof Your Wi-Fi With This Prime Day Wi-Fi 7 Router Deal
Facebook X (Twitter) Instagram Pinterest Vimeo
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release
Subscribe
Best in TechnologyBest in Technology
Home » Lumma Stealer Malware Being Spread to Windows Devices via Fake Human Verification Pages, CloudSEK Says
Laptops

Lumma Stealer Malware Being Spread to Windows Devices via Fake Human Verification Pages, CloudSEK Says

News RoomBy News Room19 September 20243 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email

Lumma Stealer, a recently identified information-stealing malware, is being distributed to users via fake human verification pages. According to researchers at the cybersecurity firm CloudSEK, the malware is targeting Windows devices and is designed to steal sensitive information from the infected device. Concerningly, researchers have discovered multiple phishing websites which are deploying these fake verification pages to trick users into downloading the malware. CloudSEK researchers have warned organisations to implement endpoint protection solutions and to train employees and users about this new social engineering tactic.

Lumma Stealer Malware Being Distributed Using New Phishing Technique

According to the CloudSEK report, multiple active websites were found to be spreading the Lumma Stealer malware. The technique was first discovered by Unit42 at Palo Alto Networks, a cybersecurity firm, but the scope of the distribution chain is now believed to be much larger than previously assumed.

The attackers have set up various malicious websites and have added a fake human verification system, resembling the Google Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) page. However, unlike the regular CAPTCHA page where users have to check a few boxes or perform similar pattern-based tasks to prove they are not a bot, the fake pages instruct the user to run some unusual commands.

In one instance, the researchers spotted a fake verification page asking users to execute a PowerShell script. PowerShell scripts contain a series of commands that can be executed in the Run dialog box. In this case, the commands were found to fetch the content from the a.txt file hosted on a remote server. This prompted a file to be downloaded and extracted on the Windows system, infecting it with Lumma Stealer.

The report also listed the malicious URLs which were spotted distributing the malware to unsuspecting users. However, this is not the full list and there might be more such websites carrying out the attack.

  • hxxps[://]heroic-genie-2b372e[.]netlify[.]app/please-verify-z[.]html
  • hxxps[://]fipydslaongos[.]b-cdn[.]net/please-verify-z[.]html
  • hxxps[://]sdkjhfdskjnck[.]s3[.]amazonaws[.]com/human-verify-system[.]html
  • hxxps[://]verifyhuman476[.]b-cdn[.]net/human-verify-system[.]html
  • hxxps[://]pub-9c4ec7f3f95c448b85e464d2b533aac1[.]r2[.]dev/human-verify-system[.]html
  • hxxps[://]verifyhuman476[.]b-cdn[.]net/human-verify-system[.]html
  • hxxps[://]newvideozones[.]click/veri[.]html
  • hxxps[://]ch3[.]dlvideosfre[.]click/human-verify-system[.]html
  • hxxps[://]newvideozones[.]click/veri[.]html
  • hxxps[://]ofsetvideofre[.]click

The researchers also observed that content delivery networks (CDNs) were being used to spread these fake verification pages. Further, the attackers were spotted using base64 encoding and clipboard manipulation to evade demonstration. It is also possible to distribute other malware using the same technique, although such instances have not been seen so far.

Since the modus operandi of the attack is based on phishing techniques, no security patch can prevent devices from getting infected. However, there are some steps users and organisations can take to safeguard against the Lumma stealer malware.

As per the report, users and employees should be made aware of this phishing tactic to help them not fall for it. Additionally, organisations should implement and maintain reliable endpoint protection solutions to detect and block PowerShell-based attacks. Further, regularly updating and patching systems to reduce the vulnerabilities that Lumma Stealer malware can exploit should also help.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticlePreorder Apple Watch Series 10 and Ultra 2: best deals so far
Next Article Moto G85 5G Could Soon Be Available in Two New Colour Options in India

Related Articles

Laptops

Amazon Prime Day Sale 2025: Best Deals On Gaming Laptops Under Rs. 80,000 in India

13 July 2025
Laptops

Amazon Prime Day Sale 2025: Best Deals on Laptops Under Rs. 50,000

12 July 2025
Laptops

boAt Valour Watch 1 GPS Online at Lowest Price in India

11 July 2025
Laptops

Acer Aspire Go 14 Price (11 Jul 2025) Specification & Reviews । Acer Laptops

11 July 2025
Laptops

Acer Aspire Go 14 Launched in India With Up to Intel Core Ultra 7 CPU: Price, Features

11 July 2025
Laptops

Amazon Prime Day Sale 2025: Best Early Deals on Gaming Laptops

11 July 2025
Demo
Top Articles

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 2024101 Views

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202495 Views

Oppo Reno 14, Reno 14 Pro India Launch Timeline and Colourways Leaked

27 May 202582 Views

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Latest News
News

How to Use Clean Energy Tax Credits Before They Disappear

News Room12 July 2025
News

Gear News of the Week: Samsung’s Trifold Promise, Ikea’s Sonos Split, and Hugging Face’s New Robot

News Room12 July 2025
News

Future-Proof Your Wi-Fi With This Prime Day Wi-Fi 7 Router Deal

News Room12 July 2025
Most Popular

The Spectacular Burnout of a Solar Panel Salesman

13 January 2025124 Views

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 2024101 Views

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202495 Views
Our Picks

Review: Timekettle T1 Handheld Translator

12 July 2025

Security News This Week: 4 Arrested Over Scattered Spider Hacking Spree

12 July 2025

How to Use Clean Energy Tax Credits Before They Disappear

12 July 2025

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Facebook X (Twitter) Instagram Pinterest
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact Us
© 2025 Best in Technology. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.