Close Menu
  • Home
  • Opinion
  • Region
    • Africa
    • Asia
    • Europe
    • Middle East
    • North America
    • Oceania
    • South America
  • AI & Machine Learning
  • Robotics & Automation
  • Space & Deep Tech
  • Web3 & Digital Economies
  • Climate & Sustainability Tech
  • Biotech & Future Health
  • Mobility & Smart Cities
  • Global Tech Pulse
  • Cybersecurity & Digital Rights
  • Future of Work & Education
  • Trend Radar & Startup Watch
  • Creator Economy & Culture
What's Hot

New Qumulo European software program R&D hub to create 50 jobs in Cork

March 29, 2026

Startup information and updates: Every day roundup (March 27, 2026)

March 29, 2026

Scientists Observe Atoms Present in Two Locations at As soon as

March 29, 2026
Facebook X (Twitter) Instagram LinkedIn RSS
NextTech NewsNextTech News
Facebook X (Twitter) Instagram LinkedIn RSS
  • Home
  • Africa
  • Asia
  • Europe
  • Middle East
  • North America
  • Oceania
  • South America
  • Opinion
Trending
  • New Qumulo European software program R&D hub to create 50 jobs in Cork
  • Startup information and updates: Every day roundup (March 27, 2026)
  • Scientists Observe Atoms Present in Two Locations at As soon as
  • Netflix might add new voice chat function to its video games
  • Moonshot AI Weighs Hong Kong IPO as Funding Demand Surges
  • Apple to maneuver away from ChatGPT exclusivity for Siri
  • Giant Screens Get Actual with the 75″ Hisense U6 Sequence Mini-LED 4K UHD Good Fireplace TV (75U65QF)
  • VIDEO REVIEW: Tesla Mannequin Y L: The 6-seater variant of the favored electrical SUV arrives in Australia
Sunday, March 29
NextTech NewsNextTech News
Home - Cybersecurity & Digital Rights - ESET takes half in world operation to disrupt Lumma Stealer
Cybersecurity & Digital Rights

ESET takes half in world operation to disrupt Lumma Stealer

NextTechBy NextTechJune 2, 2025No Comments23 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email Copy Link
Follow Us
Google News Flipboard
ESET takes half in world operation to disrupt Lumma Stealer
Share
Facebook Twitter LinkedIn Pinterest Email


ESET has collaborated with Microsoft, BitSight, Lumen, Cloudflare, CleanDNS, and GMO Registry in a world disruption operation in opposition to Lumma Stealer, an notorious malware-as-a-service (MaaS) infostealer. The operation focused Lumma Stealer infrastructure with all recognized C&C servers prior to now yr, rendering the exfiltration community, or a big a part of it, nonoperational.

Key factors of this blogpost:

  • ESET took half in a coordinated world operation to disrupt Lumma Stealer.
  • ESET offered technical evaluation and statistical data, and extracted important information from tens of hundreds of malware samples.
  • We offer an outline of the Lumma Stealer MaaS ecosystem.
  • We additionally present technical evaluation and an outline of the evolution of Lumma Stealer’s key static and dynamic properties, which have been crucial to the disruption effort.

Disruption contribution

ESET automated methods processed tens of hundreds of Lumma Stealer samples, dissecting them to extract key parts, corresponding to C&C servers and affiliate identifiers. This allowed us to repeatedly monitor Lumma Stealer’s exercise, monitor improvement updates, cluster associates, and extra.

Infostealer malware households, like Lumma Stealer, are sometimes only a foreshadowing of a future, way more devastating assault. Harvested credentials are a valued commodity within the cybercrime underground, bought by preliminary entry brokers to varied different cybercriminals, together with ransomware associates. Lumma Stealer has been one of the prevalent infostealers over the previous two years, and ESET telemetry (see Determine 1) confirms that it has left no a part of the world untouched.

Determine 1. Lumma Stealer detection price (information since July 2024)

Lumma Stealer builders had been actively growing and sustaining their malware. We have now frequently observed code updates starting from minor bug fixes to finish substitute of string encryption algorithms and modifications to the community protocol. The operators additionally actively maintained the shared exfiltration community infrastructure. Between June 17th, 2024 and Could 1st, 2025, we noticed a complete of three,353 distinctive C&C domains, averaging roughly 74 new domains rising every week together with occasional updates to Telegram-based dead-drop resolvers (see Determine 2). We talk about the main points of the community infrastructure later within the blogpost.

Figure 2. Weekly counts of new C&C domains
Determine 2. Weekly counts of recent C&C domains

This ongoing evolution underscores the numerous risk posed by Lumma Stealer and highlights the significance and complexity of the disruption effort.

Background

Over the previous two years, Lumma Stealer (also called LummaC or LummaC2) has emerged as one of the lively infostealers within the cybercrime ecosystem, turning into a well-liked software amongst cybercriminals resulting from its lively improvement of malware options and its infrastructure being bought as a service.

Malware as a service

Lumma Stealer adopts the idea of malware as a service (MaaS), the place associates pay a month-to-month payment, based mostly on their tier, to obtain the most recent malware builds and the community infrastructure needed for information exfiltration. Associates have entry to a administration panel with a user-friendly interface the place they’ll obtain exfiltrated information and harvested credentials.

The tiered subscription mannequin ranges from USD 250 to USD 1,000 monthly, every with more and more subtle options. Decrease tiers embrace fundamental filtering and log obtain choices, whereas greater tiers provide customized information assortment, evasion instruments, and early entry to new options. The most costly plan emphasizes stealth and adaptableness, providing distinctive construct era and lowered detection.

The operators of Lumma Stealer have additionally created a Telegram market with a score system for associates to promote stolen information with out intermediaries. {The marketplace} has been effectively documented in Cybereason analysis. Furthermore, they keep public documentation of the administration panel for associates and periodically share updates and fixes on hacking boards, as proven in Determine 3.

Figure 3. The official LummaStealer documentation – machine translated from Russian to English
Determine 3. The official Lumma Stealer documentation – machine translated from Russian to English (Could 12th, 2025)

Open documentation not solely helps associates with much less expertise to make use of the malware service, but in addition gives worthwhile insights for safety researchers. Builders concentrate on malware builds, information pipelining, and infrastructure upkeep, whereas associates are accountable for distributing the malware. This data, mixed with the service’s reputation, leads to all kinds of compromise vectors.

Frequent distribution strategies embrace phishing, cracked software program, and different malware downloaders together with SmokeLoader, DarkGate, Amadey, Vidar, and others. Common phishing schemes contain ClickFix or faux CAPTCHA net pages, fraudulent boards with cracked software program, faux GitHub repositories, fraudulent hyperlinks on Reddit boards, and plenty of extra.

Technical evaluation

Quite a few public analyses have already been written about Lumma Stealer and its compromise vectors. Our focus right here, nevertheless, is on the features related to the disruption. On this part, we are going to briefly introduce the important thing static and dynamic properties that we have now been actively extracting from Lumma Stealer.

Static properties of Lumma Stealer

Numerous data comes embedded in Lumma Stealer malware samples. This naturally presents a super goal for automated extraction. In addition to the apparent information of curiosity – C&C server domains – the samples additionally comprise identifier strings that tie the pattern to a selected affiliate and a marketing campaign, and an optionally available identifier resulting in a customized dynamic configuration. These identifiers are utilized in community communication with the C&C server throughout information exfiltration and requests for dynamic configuration. Within the sections beneath, we have a look at these properties in depth.

C&C domains

Every Lumma Stealer pattern accommodates an inventory of 9 encrypted C&C domains. Whereas the encryption strategies have developed over time, the attribute array construction has remained constant as much as the time of writing.

Primarily based on Lumma Stealer’s inner pattern versioning, which is closely protected by stack string obfuscation, we all know that up till January 2025, the C&C domains within the samples have been protected by an XOR operate and base64 encoding (see Determine 4). When the base64-encoded string was decoded, it revealed a construction the place the primary 32 bytes served as an XOR key, and the remaining bytes contained the encrypted C&C area.

Figure 4. List of XOR-protected and base64-encoded C&C domains
Determine 4. Record of XOR-protected and base64-encoded C&C domains

In January 2025, Lumma Stealer transitioned the safety of the C&C listing to ChaCha20 encryption with a single hardcoded key and nonce (see Determine 5). This safety of the C&C listing within the Lumma Stealer binaries has remained the identical up till the time of publication.

Figure 5. ChaCha20-protected C&C domains
Determine 5. ChaCha20-protected C&C domains

Lifeless-drop resolvers

Since June 2024, every Lumma Stealer construct got here with a brand new characteristic for acquiring a backup C&C. If no C&C server from the static config responds to Lumma Stealer, then the backup C&C is extracted from a dummy Steam profile net web page appearing as a dead-drop resolver. The Steam profile URL is closely protected within the binary, the identical method because the model string. The encrypted backup C&C URL is about within the Steam profile title, as proven in Determine 6, and the safety is an easy Caesar cipher (ROT11).

Figure 6. Steam profile and Telegram channel used as dead-drop resolvers
Determine 6. Steam profile and Telegram channel used as dead-drop resolvers

In February 2025, Lumma Stealer acquired an replace that included a characteristic for acquiring a brand new, main C&C URL from a Telegram channel dead-drop resolver. The C&C URL is extracted from the Telegram channel’s title subject, and it’s protected by the identical algorithm as within the case of the Steam profile dead-drop resolver. The primary distinction within the utilization of the Telegram and Steam profile dead-drop resolvers is that the Telegram possibility is examined first, whereas the Steam profile is used as a final resort if profitable communication has not been established with beforehand obtained C&C servers (Determine 16).

Furthermore, we imagine that the Telegram dead-drop resolver is obtainable for greater tier subscriptions. It’s because many samples shouldn’t have the Telegram URL set, and subsequently the malware skips this technique.

Lumma Stealer identifier

Every Lumma Stealer pattern accommodates a novel hardcoded affiliate identifier often known as LID. It’s embedded in plaintext type and utilized for communication with C&C servers. Up till March 2025, the LID parameter string adopted a structured format, delimited by two dashes (Determine 7). A detailed evaluation of the LID affiliate string is offered in an upcoming part.

Figure 7. LID identifier in LummaStealer sample
Determine 7. LID identifier in Lumma Stealer pattern

Though essentially the most prevalent LID noticed throughout our monitoring begins with the string uz4s1o; the second most typical LID, which begins with LPnhqo, gives a greater instance for visualizing typical LID variability. Within the phrase cloud in Determine 8, we current the highest 200 LIDs collected throughout our monitoring, beginning with LPnhqo.

Figure 8. List of the top 200 LID identifiers beginning with the LPnhqo prefix seen in our telemetry
Determine 8. Record of the highest 200 LID identifiers starting with the LPnhqo prefix seen in our telemetry

Nevertheless, in early March 2025, Lumma Stealer transitioned to utilizing hexadecimal identifiers, referred to internally as UID (see Determine 9).

Figure 9. Dynamic configuration HTTPS POST request comparison
Determine 9. Comparability of HTTPS POST requests for a dynamic configuration

Non-obligatory configuration identifier

Along with the LID parameter, Lumma Stealer samples may additionally comprise an optionally available parameter referred to internally as J. When current, this parameter is in cleartext and formatted as a 32-byte ASCII hex string (see Determine 10). The J parameter is utilized within the C&C request for dynamic configuration with extra definitions for exfiltration. We discuss dynamic configuration in additional element in a following part.

Figure 10. J parameter in the LummaStealer sample
Determine 10. The J parameter in a Lumma Stealer pattern

If the J parameter is lacking within the Lumma Stealer pattern, an empty string is used within the C&C request and a default configuration is retrieved. In contrast to LID, the J parameter isn’t current in Lumma Stealer samples. Nevertheless, it performs an important function when current, because it allows retrieving a dynamic configuration that considerably will increase the stealer’s capabilities, making it a extra versatile exfiltration software for risk actors.

In March 2025, when the LID parameter was renamed to UID and its format modified, the J parameter was renamed to CID however with no change to its format or operate.

Evaluation of static properties

From our long-term monitoring and statistical evaluation of LID parameters, we imagine that the primary section of the LID identifies the affiliate, whereas the second section differentiates between campaigns. Primarily based on this assumption you’ll be able to see the highest 200 affiliate identifiers in Determine 11.

Figure 11. The most frequently seen affiliate identifiers in our telemetry
Determine 11. Essentially the most regularly seen affiliate identifiers in our telemetry

Furthermore, we have now been capable of create a visualization of the associates’ actions over the previous yr (see Determine 12). This visualization highlights per week in January 2025. These kind of visualizations have offered us with worthwhile insights into the patterns and behaviors of various risk actors. Moreover, the visualizations reveal a shared, domain-based C&C infrastructure amongst most Lumma Stealer associates. On the similar time, we have been capable of establish much less regularly used C&C domains, which we suspect have been reserved for greater tier associates or extra essential campaigns.

Figure 12. Visualization of LummaStealer infrastructure utilization (early January 2025 time frame)
Determine 12. Visualization of Lumma Stealer infrastructure utilization (early January 2025 time-frame)

Dynamic properties of Lumma Stealer

Lumma Stealer retrieves a dynamic configuration from the C&C server, which accommodates definitions specifying what to scan for exfiltration (see Desk 1). The first focus is on stealing net browser extension information and databases containing passwords, session cookies, net looking historical past, and autofill information. In addition to net browsers, it additionally focuses on stealing information from password managers, VPNs, FTP purchasers, cloud companies, distant desktop purposes, e mail purchasers, cryptocurrency wallets, and note-taking purposes.

Desk 1. Dynamic config’s JSON fields

Key Description
v Dynamic config model.
se Possibility for taking a screenshot of the sufferer’s machine for exfiltration.
ex Record of Chromium-based browser extensions to focus on for exfiltration.
Every entry consists of:
 ·  The extension ID, saved as en.
 ·  The extension title, saved as ez.
c Definition of recordsdata focused for exfiltration.
Essentially the most attention-grabbing entries are:
 ·  The trail for file scanning, saved as p.
 ·  The file extension listing filter for exfiltration, saved as m.
 ·  The utmost folder scanning depth, saved as d.
 ·  The utmost file dimension for exfiltration, saved as fs.

Although we haven’t seen vital modifications within the default configurations, this characteristic enhances the malware’s means to carry out focused exfiltration (see Determine 13). A complete overview of the configuration fields has already been effectively documented on this analysis by SpyCloud.

Figure 13. Example of a dynamic config
Determine 13. Instance of a dynamic config

The configuration is in JSON format, and it’s downloaded from the C&C server utilizing an HTTPS POST request that features the LID identifier, optionally available J parameter, and a selected hardcoded Consumer-Agent string.

The safety of the dynamic configuration has modified just a few occasions just lately. Previously, it was protected in the identical method because the static C&C listing, by a 32-byte XOR operate and base64 encoding. In March 2025 the safety modified to ChaCha20, the place the important thing and nonce have been prepended to the encrypted configuration.

The Consumer-Agent string is essential to comply with, as offering it appropriately is crucial for receiving the dynamic configuration. In April 2025, Lumma Stealer launched a further layer of obfuscation by encrypting JSON values utilizing an 8-byte XOR operate (see Determine 14).

Figure 14. Dynamic configuration with encryption of some values
Determine 14. Dynamic configuration with encryption of some values

This encrypted variant of the dynamic configuration is delivered when a barely up to date Consumer-Agent string is specified (see Desk 2).

Desk 2. Consumer-Agent variants

Consumer-Agent Description
Mozilla/5.0 (Home windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36 Outdated Consumer-Agent string leading to a dynamic configuration variant proven in Determine 13.
Mozilla/5.0 (Home windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 New Consumer-Agent string leading to a dynamic configuration variant with encryption of some values (Determine 14).

In addition to this dynamic configuration method, Lumma Stealer samples nonetheless comprise hardcoded directions for exfiltrating recordsdata. These embrace information from purposes corresponding to Outlook or Thunderbird, Steam account data, and Discord account tokens (see this SpyCloud blogpost). This mix of dynamic and hardcoded configurations ensures that Lumma Stealer can successfully accumulate a variety of worthwhile information.

To summarize all of the static and dynamic modifications talked about to this point, we have now created a timeline (Determine 15) highlighting essentially the most vital developments noticed within the Lumma Stealer malware over the previous yr.

Figure 15. Timeline of the most significant updates over the past year
Determine 15. Timeline of essentially the most vital updates over the previous yr

C&C communication

All through our Lumma Stealer monitoring interval, all extracted C&C domains persistently led to Cloudflare companies, that are utilized to hide Lumma Stealer’s actual C&C infrastructure. Cloudflare companies are additionally employed for C&C servers situated through dead-drop resolvers.

First, Lumma Stealer must acquire an lively C&C server. The mechanism of this selection is illustrated within the circulate chart proven in Determine 16.

Figure 16. C&C selection mechanism
Determine 16. C&C choice mechanism

Handshake

Though the precise handshake request to the C&C server will not be current within the newest Lumma Stealer builds, it’s price mentioning as a result of it was a characteristic of our monitoring for a very long time. The handshake request was an HTTPS POST request containing act=stay and a hardcoded Consumer-Agent. Lively servers responded with a cleartext okay message.

Configuration request

When Lumma Stealer identifies an lively C&C server, it requests the configuration through an HTTPS POST request (Determine 17), which incorporates the LID and J parameters as information. If the J parameter will not be current within the pattern, Lumma Stealer retrieves the default configuration from the C&C server. This configuration specifies what to scan for exfiltration, permitting the malware to adapt to totally different targets and environments.

Extra payload execution

After Lumma Stealer efficiently exfiltrates delicate information and harvested credentials, it points one ultimate HTTPS POST request to the C&C server – this time, with a further sufferer {hardware} ID known as hwid. This ultimate request retrieves a configuration of a further payload to be executed on the sufferer’s machine. The payload or a URL to obtain from is a part of that configuration. Be aware that such a payload will not be at all times offered.

Figure 17. LummaStealer C&C communication flow
Determine 17. Lumma Stealer C&C communication circulate

Anti-analysis obfuscation strategies

Lumma Stealer employs just a few, however efficient, anti-emulation strategies to make evaluation as sophisticated as potential. These strategies are designed to evade detection and hinder the efforts of safety analysts.

Oblique leap obfuscation

One of many main obfuscation strategies utilized by Lumma Stealer is oblique management circulate flattening, proven in Determine 18. This technique successfully disrupts the code blocks of the capabilities, making it almost unimaginable to maintain monitor of the operate logic. By flattening the management circulate, the malware obfuscates its operations, complicating the evaluation course of. For an in depth exploration of this system and thorough evaluation of those obfuscation patterns, together with a top level view of the answer, you’ll be able to check with this complete article by Mandiant.

Figure 18. Indirect control flow obfuscation
Determine 18. Oblique management circulate obfuscation

Stack strings

One other method employed by Lumma Stealer is using encrypted stack strings, as illustrated in Determine 19. This technique successfully hides binary information and plenty of essential strings within the Lumma Stealer pattern, making static evaluation of the binary troublesome. Furthermore, every encrypted string has its personal distinctive mathematical operate for decryption, including one other layer of complexity to the evaluation course of.

Figure 19. Stack string decryption routine
Determine 19. Stack string decryption routine

Import API obfuscation

In Lumma Stealer, imports are resolved at runtime. Import names are hashed utilizing the FNV-1a algorithm with every construct utilizing a customized offset foundation. As proven in Determine 20, since August 25th, 2024, Lumma Stealer additionally obfuscates the FNV hash algorithm parameters by utilizing stack strings.

Figure 20. Import API hash algorithm parameter obfuscation
Determine 20. Stack string obfuscation of hash parameters used for obfuscating imported API names

Conclusion

This world disruption operation was made potential by our long-term monitoring of Lumma Stealer, which we have now offered an outline of on this blogpost. We have now described the modus operandi of the Lumma Stealer group and its service. Moreover, we have now documented the essential static identifiers and C&C communication in addition to its evolution during the last yr. Lastly, we summarized the important thing obfuscation strategies that make the evaluation of Lumma Stealer difficult.

The disruption operation, led by Microsoft, goals to grab all recognized Lumma Stealer C&C domains, rendering Lumma Stealer’s exfiltration infrastructure nonfunctional. ESET will proceed to trace different infostealers whereas intently monitoring for Lumma Stealer exercise following this disruption operation.

For any inquiries about our analysis printed on WeLiveSecurity, please contact us at threatintel@eset.com. 
ESET Analysis provides personal APT intelligence stories and information feeds. For any inquiries about this service, go to the ESET Risk Intelligence web page.

IoCs

SHA-1 Filename Detection Description
6F94CFAABB19491F2B8E719D74AD032D4BEB3F29 AcroRd32.exe Win32/Spy.Lumma Stealer.B Lumma Stealer pattern – Construct 2024-06-27.
C5D3278284666863D7587F1B31B06F407C592AC4 Notion.exe Win32/Spy.Lumma Stealer.B Lumma Stealer pattern – Construct 2024-07-14.
5FA1EDC42ABB42D54D98FEE0D282DA453E200E99 explorer.exe Win32/Spy.Lumma Stealer.B Lumma Stealer pattern – Construct 2024-08-08.
0D744811CF41606DEB41596119EC7615FFEB0355 aspnet_regiis.exe Win32/Spy.Lumma Stealer.B Lumma Stealer pattern – Construct 2024-08-25.
2E3D4C2A7C68DE2DD31A8E0043D9CF7E7E20FDE1 nslookup.exe Win32/Spy.Lumma Stealer.B Lumma Stealer pattern – Construct 2024-09-20.
09734D99A278B3CF59FE82E96EE3019067AF2AC5 nslookup.exe Win32/Spy.Lumma Stealer.B Lumma Stealer pattern – Construct 2024-10-04.
1435D389C72A5855A5D6655D6299B4D7E78A0127 BitLockerToGo.exe Win32/Spy.Lumma Stealer.B Lumma Stealer pattern – Construct 2024-11-09.
2CCCEA9E1990D6BC7755CE5C3B9B0E4C9A8F0B59 exterior.exe Win32/Spy.Lumma Stealer.B Lumma Stealer pattern – Construct 2024-12-23.
658550E697D9499DB7821CBBBF59FFD39EB59053 Wemod-Premium-Unlocker-2025 MSIL/GenKryptik.HGWU Lumma Stealer pattern – Construct 2025-01-18.
070A001AC12139CC1238017D795A2B43AC52770D khykuQw.exe Win32/Kryptik.HYUC Lumma Stealer pattern – Construct 2025-02-27.
1FD806B1A0425340704F435CBF916B748801A387 Begin.exe Win64/Injector.WR Lumma Stealer pattern – Construct 2025-03-24.
F4840C887CAAFF0D5E073600AEC7C96099E32030 loader.exe Win64/Kryptik.FAZ Lumma Stealer pattern – Construct 2025-04-15.
8F58C4A16717176DFE3CD531C7E41BEF8CDF6CFE Set-up.exe Win32/Spy.Lumma Stealer.B Lumma Stealer pattern – Construct 2025-04-23.

Community

IP Area Internet hosting supplier First seen Particulars
172.67.134[.]100 cooperatvassquaidmew[.]xyz Cloudflare, Inc. 2024‑06‑27 Lumma Stealer C&C server.
172.67.175[.]165 crisisrottenyjs[.]xyz Cloudflare, Inc. 2024‑06‑27 Lumma Stealer C&C server.
188.114.96[.]1 deadtrainingactioniw[.]xyz
tamedgeesy[.]sbs
nighetwhisper[.]prime
Cloudflare, Inc. 2024‑06‑27 Lumma Stealer C&C server.
172.67.141[.]43 exuberanttjdkwo[.]xyz Cloudflare, Inc. 2024‑06‑27 Lumma Stealer C&C server.
188.114.96[.]3 grandcommonyktsju[.]xyz Cloudflare, Inc. 2024‑06‑27 Lumma Stealer C&C server.
104.21.92[.]96 qualificationjdwko[.]xyz Cloudflare, Inc. 2024‑06‑27 Lumma Stealer C&C server.
172.67.209[.]200 sweetcalcutangkdow[.]xyz Cloudflare, Inc. 2024‑06‑27 Lumma Stealer C&C server.
104.21.49[.]80 wordingnatturedowo[.]xyz Cloudflare, Inc. 2024‑06‑27 Lumma Stealer C&C server.
188.114.97[.]0 bigmouthudiop[.]store
froytnewqowv[.]store
locatedblsoqp[.]store
stagedchheiqwo[.]store
Cloudflare, Inc. 2024‑07‑16 Lumma Stealer C&C server.
104.21.19[.]156 callosallsaospz[.]store Cloudflare, Inc. 2024‑07‑18 Lumma Stealer C&C server.
172.67.153[.]40 indexterityszcoxp[.]store Cloudflare, Inc. 2024‑07‑18 Lumma Stealer C&C server.
172.67.192[.]52 lariatedzugspd[.]store Cloudflare, Inc. 2024‑07‑18 Lumma Stealer C&C server.
172.67.213[.]85 liernessfornicsa[.]store Cloudflare, Inc. 2024‑07‑18 Lumma Stealer C&C server.
172.67.137[.]78 outpointsozp[.]store Cloudflare, Inc. 2024‑07‑18 Lumma Stealer C&C server.
172.67.221[.]214 shepherdlyopzc[.]store Cloudflare, Inc. 2024‑07‑18 Lumma Stealer C&C server.
172.67.204[.]158 unseaffarignsk[.]store Cloudflare, Inc. 2024‑07‑18 Lumma Stealer C&C server.
172.67.178[.]194 upknittsoappz[.]store Cloudflare, Inc. 2024‑07‑18 Lumma Stealer C&C server.
188.114.97[.]3 bassizcellskz[.]store
byteplusx[.]digital
sparkiob[.]digital
longitudde[.]digital
Cloudflare, Inc. 2024‑08‑07 Lumma Stealer C&C server.
104.21.47[.]141 celebratioopz[.]store Cloudflare, Inc. 2024‑08‑07 Lumma Stealer C&C server.
172.67.158[.]159 complaintsipzzx[.]store Cloudflare, Inc. 2024‑08‑07 Lumma Stealer C&C server.
172.67.204[.]20 deallerospfosu[.]store Cloudflare, Inc. 2024‑08‑07 Lumma Stealer C&C server.
104.21.35[.]48 languagedscie[.]store Cloudflare, Inc. 2024‑08‑07 Lumma Stealer C&C server.
104.21.73[.]43 mennyudosirso[.]store Cloudflare, Inc. 2024‑08‑07 Lumma Stealer C&C server.
188.114.97[.]9 quialitsuzoxm[.]store Cloudflare, Inc. 2024‑08‑07 Lumma Stealer C&C server.
172.67.166[.]231 writerospzm[.]store Cloudflare, Inc. 2024‑08‑07 Lumma Stealer C&C server.
104.21.16[.]180 caffegclasiqwp[.]store Cloudflare, Inc. 2024‑08‑24 Lumma Stealer C&C server.
172.67.146[.]35 condedqpwqm[.]store Cloudflare, Inc. 2024‑08‑24 Lumma Stealer C&C server.
N/A evoliutwoqm[.]store N/A 2024‑08‑24 Lumma Stealer C&C server.
188.114.96[.]0 millyscroqwp[.]store
stamppreewntnq[.]store
advennture[.]prime
Cloudflare, Inc. 2024‑08‑24 Lumma Stealer C&C server.
104.21.67[.]155 traineiwnqo[.]store Cloudflare, Inc. 2024‑08‑24 Lumma Stealer C&C server.
94.140.14[.]33 achievenmtynwjq[.]store
carrtychaintnyw[.]store
chickerkuso[.]store
metallygaricwo[.]store
milldymarskwom[.]store
opponnentduei[.]store
puredoffustow[.]store
quotamkdsdqo[.]store
bemuzzeki[.]sbs
exemplarou[.]sbs
exilepolsiy[.]sbs
frizzettei[.]sbs
invinjurhey[.]sbs
isoplethui[.]sbs
laddyirekyi[.]sbs
wickedneatr[.]sbs
Cloudflare, Inc. 2024‑09‑21 Lumma Stealer C&C server.
188.114.97[.]4 usseorganizedw[.]store
bellflamre[.]click on
tripfflux[.]world
Cloudflare, Inc. 2024‑09‑24 Lumma Stealer C&C server.
104.21.44[.]84 beerishint[.]sbs Cloudflare, Inc. 2024‑10‑06 Lumma Stealer C&C server.
104.21.64[.]84 1212tank.activitydmy[.]icu Cloudflare, Inc. 2024‑11‑12 Lumma Stealer C&C server.
104.21.93[.]246 brownieyuz[.]sbs Cloudflare, Inc. 2024‑11‑08 Lumma Stealer C&C server.
172.67.189[.]210 ducksringjk[.]sbs Cloudflare, Inc. 2024‑11‑08 Lumma Stealer C&C server.
172.67.146[.]64 explainvees[.]sbs Cloudflare, Inc. 2024‑11‑08 Lumma Stealer C&C server.
104.21.90[.]226 relalingj[.]sbs Cloudflare, Inc. 2024‑11‑08 Lumma Stealer C&C server.
104.21.14[.]17 repostebhu[.]sbs Cloudflare, Inc. 2024‑11‑08 Lumma Stealer C&C server.
172.67.192[.]43 rottieud[.]sbs Cloudflare, Inc. 2024‑11‑08 Lumma Stealer C&C server.
188.114.97[.]1 thinkyyokej[.]sbs Cloudflare, Inc. 2024‑11‑08 Lumma Stealer C&C server.
188.114.97[.]7 bashfulacid[.]lat
tentabatte[.]lat
Cloudflare, Inc. 2024‑12‑23 Lumma Stealer C&C server.
104.21.86[.]54 curverpluch[.]lat Cloudflare, Inc. 2024‑12‑23 Lumma Stealer C&C server.
104.21.66[.]86 lev‑tolstoi[.]com Cloudflare, Inc. 2024‑12‑17 Lumma Stealer C&C server.
172.64.80[.]1 manyrestro[.]lat
toppyneedus[.]biz
Cloudflare, Inc. 2024‑12‑23 Lumma Stealer C&C server.
188.114.97[.]2 shapestickyr[.]lat Cloudflare, Inc. 2024‑12‑23 Lumma Stealer C&C server.
172.67.192[.]247 slipperyloo[.]lat Cloudflare, Inc. 2024‑12‑23 Lumma Stealer C&C server.
104.105.90[.]131 steamcommunity[.]com
steamcommunity[.]com
Akamai Applied sciences, Inc. 2024‑06‑27 Steam profile useless‑drop resolvers.
172.67.146[.]68 talkynicer[.]lat Cloudflare, Inc. 2024‑12‑23 Lumma Stealer C&C server.
172.67.184[.]241 wordyfindy[.]lat Cloudflare, Inc. 2024‑12‑23 Lumma Stealer C&C server.
N/A beevasyeip[.]bond N/A 2025‑01‑22 Lumma Stealer C&C server.
N/A broadecatez[.]bond N/A 2025‑01‑22 Lumma Stealer C&C server.
N/A encirelk[.]cyou N/A 2025‑01‑28 Lumma Stealer C&C server.
N/A granystearr[.]bond N/A 2025‑01‑22 Lumma Stealer C&C server.
N/A quarrelepek[.]bond N/A 2025‑01‑22 Lumma Stealer C&C server.
N/A rockemineu[.]bond N/A 2025‑01‑28 Lumma Stealer C&C server.
104.21.19[.]91 suggestyuoz[.]biz Cloudflare, Inc. 2025‑01‑22 Lumma Stealer C&C server.
N/A tranuqlekper[.]bond N/A 2025‑01‑22 Lumma Stealer C&C server.
104.21.69[.]194 codxefusion[.]prime Cloudflare, Inc. 2025‑02‑28 Lumma Stealer C&C server.
104.21.80[.]1 earthsymphzony[.]at present
climatologfy[.]prime
Cloudflare, Inc. 2025‑02‑26 Lumma Stealer C&C server.
104.21.88[.]16 experimentalideas[.]at present Cloudflare, Inc. 2025‑03‑01 Lumma Stealer C&C server.
172.67.146[.]181 gadgethgfub[.]icu Cloudflare, Inc. 2025‑03‑01 Lumma Stealer C&C server.
104.21.48[.]238 hardrwarehaven[.]run Cloudflare, Inc. 2025‑02‑28 Lumma Stealer C&C server.
104.21.16[.]1 hardswarehub[.]at present
pixtreev[.]run
Cloudflare, Inc. 2025‑02‑28 Lumma Stealer C&C server.
104.21.39[.]95 quietswtreams[.]life Cloudflare, Inc. 2025‑02‑26 Lumma Stealer C&C server.
172.67.222[.]46 socialsscesforum[.]icu Cloudflare, Inc. 2025‑03‑03 Lumma Stealer C&C server.
172.67.191[.]187 techmindzs[.]stay Cloudflare, Inc. 2025‑03‑01 Lumma Stealer C&C server.
172.67.214[.]226 techspherxe[.]prime Cloudflare, Inc. 2025‑03‑01 Lumma Stealer C&C server.
104.21.26[.]124 appgridn[.]stay Cloudflare, Inc. 2025‑03‑24 Lumma Stealer C&C server.
172.67.178[.]7 lunoxorn[.]prime Cloudflare, Inc. 2025‑03‑31 Lumma Stealer C&C server.
104.21.47[.]117 skynetxc[.]stay Cloudflare, Inc. 2025‑03‑24 Lumma Stealer C&C server.
104.21.72[.]121 targett[.]prime Cloudflare, Inc. 2025‑03‑20 Lumma Stealer C&C server.
188.114.96[.]2 travewlio[.]store Cloudflare, Inc. 2025‑03‑20 Lumma Stealer C&C server.
104.21.42[.]7 changeaie[.]prime Cloudflare, Inc. 2025‑04‑08 Lumma Stealer C&C server.
104.21.85[.]126 clarmodq[.]prime Cloudflare, Inc. 2025‑04‑08 Lumma Stealer C&C server.
172.67.161[.]40 liftally[.]prime Cloudflare, Inc. 2025‑04‑08 Lumma Stealer C&C server.
172.67.176[.]107 piratetwrath[.]run Cloudflare, Inc. 2025‑04‑17 Lumma Stealer C&C server.
172.67.215[.]114 quilltayle[.]stay Cloudflare, Inc. 2025‑04‑17 Lumma Stealer C&C server.
172.67.143[.]12 salaccgfa[.]prime Cloudflare, Inc. 2025‑04‑08 Lumma Stealer C&C server.
104.21.5[.]146 starofliught[.]prime Cloudflare, Inc. 2025‑04‑17 Lumma Stealer C&C server.
104.21.32[.]1 zestmodp[.]prime Cloudflare, Inc. 2025‑04‑08 Lumma Stealer C&C server.
172.67.147[.]123 equatorf[.]run Cloudflare, Inc. 2025‑04‑21 Lumma Stealer C&C server.
104.21.112[.]1 hemispherexz[.]prime Cloudflare, Inc. 2025‑04‑21 Lumma Stealer C&C server.
104.21.20[.]106 latitudert[.]stay Cloudflare, Inc. 2025‑04‑21 Lumma Stealer C&C server.
172.67.216[.]12 sectorecoo[.]stay Cloudflare, Inc. 2025‑04‑19 Lumma Stealer C&C server.

MITRE ATT&CK strategies

This desk was constructed utilizing model 17 of the MITRE ATT&CK framework.

Tactic ID Title Description
Useful resource Growth T1587.001 Develop Capabilities: Malware Lumma Stealer operators actively developed their malware as a product for his or her service.
T1583.001 Purchase Infrastructure: Domains Lumma Stealer operators registered domains for his or her exfiltration infrastructure.
T1583.006 Purchase Infrastructure: Internet Providers Lumma Stealer operators used Cloudflare companies to cover their infrastructure. Lumma Stealer additionally hid its C&C URLs in public companies like dummy Steam profiles or empty Telegram channels.
Execution T1059.003 Command-Line Interface: Home windows Command Shell Lumma Stealer executes cmd.exe to delete non permanent recordsdata.
T1106 Native API Lumma Stealer executes a wide range of Home windows APIs, together with VirtualAlloc, LoadLibraryA, and GetProcAddress.
T1204.001 Consumer Execution: Malicious Hyperlink Lumma Stealer operators provide a easy LNK packing characteristic for his or her malware builds.
T1047 Home windows Administration Instrumentation Lumma Stealer makes use of WMI queries to collect system data.
Protection Evasion T1622 Debugger Evasion Lumma Stealer checks for debugger presence.
T1140 Deobfuscate/Decode Information or Data Lumma Stealer makes use of ChaCha20 for C&C listing and dynamic config encryption.
T1027.007 Obfuscated Information or Data: Dynamic API Decision Lumma Stealer resolves API names at runtime utilizing the FNV-1a hash algorithm.
T1027.013 Obfuscated Information or Data: Encrypted/Encoded File Lumma Stealer encrypts strings and essential binary information utilizing stack strings or ChaCha20.
Credential Entry T1555.003 Credentials from Password Shops: Credentials from Internet Browsers Lumma Stealer gathers credentials from a number of browsers.
T1539 Steal Internet Session Cookie Lumma Stealer gathers cookies from a number of browsers.
Discovery T1217 Browser Bookmark Discovery Lumma Stealer checks and collects varied details about put in browsers on victims’ machines.
T1012 Question Registry Lumma Stealer queries registry keys to listing put in software program on victims’ machines.
T1057 Course of Discovery Lumma Stealer sends the method listing to its C&C server.
T1518 Software program Discovery Lumma Stealer sends an inventory of put in software program to its C&C server.
T1082 System Data Discovery Lumma Stealer sends system data to its C&C server.
T1124 System Time Discovery Lumma Stealer sends the present system time and time zone to its C&C server.
Assortment T1560 Archive Collected Knowledge Lumma Stealer compresses gathered information earlier than exfiltration to its C&C server.
T1119 Automated Assortment Lumma Stealer’s exfiltration capabilities are absolutely automated and based mostly on a configuration file.
T1113 Display screen Seize Lumma Stealer takes screenshots of victims’ machines based mostly on dynamic configuration.
T1005 Knowledge from Native System Lumma Stealer collects native system information from victims’ machines.
Command and Management T1071.001 Utility Layer Protocol: Internet Protocols Lumma Stealer makes use of HTTPS communication with its C&C servers.
T1132.001 Knowledge Encoding: Normal Encoding Lumma Stealer used base64 encoding for acquiring its configuration from the C&C server.
T1573.001 Encrypted Channel: Symmetric Cryptography Lumma Stealer makes use of extra ChaCha20 encryption below the HTTPS community protocol.
T1008 Fallback Channels Lumma Stealer employs backup dead-drop resolvers in Steam profiles and Telegram channels.
T1102.001 Internet Service: Lifeless Drop Resolver Lumma Stealer employs backup dead-drop resolvers in Steam profiles and Telegram channels.
Exfiltration T1020 Automated Exfiltration Lumma Stealer exfiltrates stolen credentials and information over the C&C channel.
T1041 Exfiltration Over C2 Channel Lumma Stealer exfiltrates stolen credentials and information over the C&C channel.

eti eset threat intelligence

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
NextTech
  • Website

Related Posts

RSAC 2026 wrap-up – Week in safety with Tony Anscombe

March 28, 2026

LangChain, LangGraph Flaws Expose Recordsdata, Secrets and techniques, Databases in Broadly Used AI Frameworks

March 28, 2026

AitM Phishing Targets TikTok Enterprise Accounts Utilizing Cloudflare Turnstile Evasion

March 27, 2026
Add A Comment
Leave A Reply Cancel Reply

Economy News

New Qumulo European software program R&D hub to create 50 jobs in Cork

By NextTechMarch 29, 2026

The roles will likely be out there in areas similar to engineering, analysis and growth,…

Startup information and updates: Every day roundup (March 27, 2026)

March 29, 2026

Scientists Observe Atoms Present in Two Locations at As soon as

March 29, 2026
Top Trending

New Qumulo European software program R&D hub to create 50 jobs in Cork

By NextTechMarch 29, 2026

The roles will likely be out there in areas similar to engineering,…

Startup information and updates: Every day roundup (March 27, 2026)

By NextTechMarch 29, 2026

YourStory brings you in the present day’s headlines with the most recent…

Scientists Observe Atoms Present in Two Locations at As soon as

By NextTechMarch 29, 2026

Australian researchers have pulled off one thing that quantum idea predicted however…

Subscribe to News

Get the latest sports news from NewsSite about world, sports and politics.

NEXTTECH-LOGO
Facebook X (Twitter) Instagram YouTube

AI & Machine Learning

Robotics & Automation

Space & Deep Tech

Web3 & Digital Economies

Climate & Sustainability Tech

Biotech & Future Health

Mobility & Smart Cities

Global Tech Pulse

Cybersecurity & Digital Rights

Future of Work & Education

Creator Economy & Culture

Trend Radar & Startup Watch

News By Region

Africa

Asia

Europe

Middle East

North America

Oceania

South America

2025 © NextTech-News. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms Of Service
  • Advertise With Us
  • Write For Us
  • Submit Article & Press Release

Type above and press Enter to search. Press Esc to cancel.

Subscribe For Latest Updates

Sign up to best of Tech news, informed analysis and opinions on what matters to you.

Invalid email address
 We respect your inbox and never send spam. You can unsubscribe from our newsletter at any time.     
Thanks for subscribing!