Microsoft dismantles Lumma Stealer infrastructure after domain seizure

Lumma Stealer takedown by Microsoft disrupted key infrastructure used to control this fast-evolving info-stealing malware.

Microsoft has successfully taken down the infrastructure behind Lumma Stealer, a prominent info-stealing malware sold as Malware-as-a-Service on cybercrime forums. The operation involved seizing the primary domain used for command-and-control, disrupting the malware’s communication channels. Lumma Stealer was used to extract credentials, browser data and crypto wallet information from infected systems. Active since 2022, it evolved rapidly through regular updates and widespread affiliate distribution. The malware was often bundled in cracked software and phishing attachments. Microsoft’s Digital Crimes Unit coordinated with international law enforcement to execute the seizure and stated that efforts are ongoing to identify and dismantle remaining nodes in the network.

Analysis by Our Experts:


Taking down a domain is tactical. Dismantling an ecosystem is strategic. While Microsoft’s operation disrupts Lumma Stealer temporarily, the broader Malware-as-a-Service model remains untouched and thriving. The speed at which Lumma evolved and propagated shows that cybercriminals operate with agile methodologies rivaling legitimate development teams. The core issue lies in demand and affiliate monetization, not just infrastructure… It’s still a very fine catch!

Read the full article here.

Stay informed with us!

You can subscribe to our monthly cybersecurity newsletter to receive updates about us and the industry

Blog

Check the latest updates on threats, stories, events and analysis.

US Requires Public Social Media for Visa Applicants

US Requires Public Social Media for Visa Applicants

APT28 Exploits Signal Chat to Deliver BEARDSHELL Malware

APT28 Exploits Signal Chat to Deliver BEARDSHELL Malware

cyber conflict Israel Iran Cyberkonflikt zwischen Israel und Iran.

ZENDATA’s Cyber Analysis of the Iran-Israel Conflict