Original Article Text

Click to Toggle View

Lumma infostealer malware returns after law enforcement disruption. The Lumma infostealer malware operation is gradually resuming activities following a massive law enforcement operation in May, which resulted in the seizure of 2,300 domains and parts of its infrastructure. Although the Lumma malware-as-a-service (MaaS) platform suffered significant disruption from the law enforcement action, as confirmed by early June reports on infostealer activity, it didn't shut down. The operators immediately acknowledged the situation on XSS forums, but claimed that their central server had not been seized (although it had been remotely wiped), and restoration efforts were already underway. Gradually, the MaaS built up again and regained trust within the cybercrime community, and is now facilitating infostealing operations on multiple platforms again. According to Trend Micro analysts, Lumma has almost returned to pre-takedown activity levels, with the cybersecurity firm's telemetry indicating a rapid rebuilding of infrastructure. "Following the law enforcement action against Lumma Stealer and its associated infrastructure, our team has observed clear signs of a resurgence in Lumma's operations," reads the Trend Micro report. "Network telemetry indicates that Lumma's infrastructure began ramping up again within weeks of the takedown." Trend Micro reports that Lumma still uses legitimate cloud infrastructure to mask malicious traffic, but has now shifted from Cloudflare to alternative providers, most notably the Russian-based Selectel, to avoid takedowns. The researchers have highlighted four distribution channels that Lumma currently uses to achieve new infections, indicating a full-on return to multifaceted targeting. The re-emergence of Lumma as a significant threat demonstrates that law enforcement action, devoid of arrests or at least indictments, is ineffective in stopping these determined threat actors. MaaS operations, such as Lumma, are incredibly profitable, and the leading operators behind them likely view law enforcement action as routine obstacles they merely have to navigate. Cloud Detection & Response for Dummies Contain emerging threats in real time - before they impact your business. Learn how cloud detection and response (CDR) gives security teams the edge they need in this practical, no-nonsense guide.

Daily Brief Summary

MALWARE // Lumma Infostealer Malware Resurfaces Post Law Enforcement Disruption

The Lumma infostealer malware operation has resumed after a major law enforcement crackdown in May, involving the seizure of 2,300 domains.

Despite considerable disruptions, Lumma's malware-as-a-service (MaaS) was not completely shut down; restoration began almost immediately post-seizure.

The malware network has almost returned to its original activity level before the crackdown, facilitated by new infrastructure and trust rebuilding within the cybercrime community.

Trend Micro reports a swift resurgence in operations, with network telemetry showing rapid infrastructure rebuilding by Lumma operators.

Lumma now utilizes alternative legitimate cloud providers, including Russian-based Selectel, to evade further takedowns.

The malware is distributed through four main channels, indicating a robust and diversified infection strategy.

The persistence and recovery of Lumma indicate that current law enforcement strategies may need revisions, as arrests or indictments are essential to curb such resilient cybercrime activities.