Threat analysis by The RabitaNoor (RBTN) Cyber Research Center

Disruption of Lumma Infostealer Malware Operation and Seizure of 2,300 Domains

The goals of this document is to provide technical and strategic analysis of a much larger document, audio etc.

The document is a product of the RBTN - CYOI Pulpit


Main Image

Photo by Yeshi Kangrang


Document Summary

Earlier this month, a coordinated disruption action targeting the Lumma malware-as-a-service (MaaS) information stealer operation seized thousands of domains and part of its infrastructure backbone worldwide. This effort involved multiple tech companies and law enforcement authorities, resulting in Microsoft's seizure of approximately 2,300 domains after legal action against the malware on May 13, 2025. At the same time, the Department of Justice (DOJ) disrupted marketplaces where the malware was rented to cybercriminals by seizing Lumma's control panel, while Europol's European Cybercrime Center (EC3) and Japan's Cybercrime Control Center (JC3) helped to seize Lumma's infrastructure based in Europe and Japan. Lumma (also known as LummaC2) is a malware-as-a-service information stealer targeting Windows and macOS systems that cybercriminals can rent for a subscription between $250 and $1,000. The malware comes with advanced evasion and data theft capabilities, and it's commonly distributed through various channels, including GitHub comments, deepfake nude generator sites, and malvertising to infect victims. After compromising a system, Lumma can steal data from web browsers and applications, including cryptocurrency wallets and cookies, credentials, passwords, credit cards, and browsing history from Google Chrome, Microsoft Edge, Mozilla Firefox, and other Chromium browsers. This stolen data is then collected into an archive and sent back to attacker-controlled servers, who will sell the information on cybercrime marketplaces or use it in other attacks.

Analysis

Overview

Timestamp: 2025-05-21

Title: Disruption of Lumma Infostealer Malware Operation and Seizure of 2,300 Domains

Severity: High

The Lumma infostealer operation involved cybercriminals offering malware-as-a-service targeting Windows and macOS systems. The adversaries, known as Lumma operators, utilized advanced evasion and data theft capabilities to compromise victims globally. The infrastructure included domains, control panels, and servers for data collection, with victims spanning various industries. The operation was disrupted through a coordinated effort by tech companies and law enforcement, resulting in the seizure of 2,300 domains and the dismantling of Lumma's infrastructure.

Adversary

Adversary: Lumma operators are cybercriminals offering malware-as-a-service targeting Windows and macOS systems.

Motivation: Financial gain through data theft and sale on cybercrime marketplaces.

Sophistication: High, with advanced evasion and data theft capabilities.

TTPs:

Capability

Capability: Lumma malware is capable of stealing data from web browsers and applications.

Tools: Lumma malware, Malvertising

Evasion: Bypassing security measures

Infrastructure

Description: Lumma's infrastructure includes domains, control panels, and servers for data collection.

C2 Servers: Attacker-controlled servers

Domains: Seized 2,300 domains

Hosting Providers: Cloudflare

Communication Protocols: HTTP, HTTPS

Victim Profile

Targets: Victims include Windows and macOS users targeted by Lumma malware.

Industry: Various, including education and retail

Assets: Web browsers, Cryptocurrency wallets

Data at Risk: Credentials, Passwords, Credit cards

Impact: High

References