The Lumma Stealer malware has the ability to compromise crypto wallets as well as browser extensions for the purposes of obtaining private data. It turns out that malicious actors are now posting videos to YouTube in order to give the malware a wider reach than might have been the case otherwise.
This information is coming out of a report released by Fortinet, a cybersecurity firm based in California. With all of that having been said and now out of the way, it is important to note that these videos pose as handy guides that can help you use cracked software. The description box for these videos contains a link that supposedly contains ZIP files, and the URLs are shortened with third parties to obscure their true purpose.
If a user were to click on one of these links, they would end up inadvertently downloading a .NET loader that would install the Lumma Stealer malware on the system. The malicious actors behind this malware campaign are avoiding the use of private servers because of the fact that this is the sort of thing that could potentially end up leaving them exposed. Instead, they are launching attacks through open source platforms such as GitHub.
It bears mentioning that the Lumma Stealer malware can be purchased on a subscription basis for around $150 per month. It can steal immense quantities of data without realizing it, and even bypass 2FA browser extensions leaving this method of cybersecurity practically useless with all things having been considered and taken into account.
It will be interesting to see where things go from here on out, since this malware has the potential to cause widespread harm. This also further reveals why it’s usually not a good idea to try to download cracked software, since there is an entire industry based around hoodwinking people that take part in this practice.
The developer of this malware, Lumma, may actually be a notorious malicious actor named Shamel. This threat actor has evaded detection, and is continuing to sell this malware to countless other buyers that have now made their way to YouTube to target unsuspecting users.
Read next: Broadband Market Expected to Nearly Double by 2030
This information is coming out of a report released by Fortinet, a cybersecurity firm based in California. With all of that having been said and now out of the way, it is important to note that these videos pose as handy guides that can help you use cracked software. The description box for these videos contains a link that supposedly contains ZIP files, and the URLs are shortened with third parties to obscure their true purpose.
If a user were to click on one of these links, they would end up inadvertently downloading a .NET loader that would install the Lumma Stealer malware on the system. The malicious actors behind this malware campaign are avoiding the use of private servers because of the fact that this is the sort of thing that could potentially end up leaving them exposed. Instead, they are launching attacks through open source platforms such as GitHub.
It bears mentioning that the Lumma Stealer malware can be purchased on a subscription basis for around $150 per month. It can steal immense quantities of data without realizing it, and even bypass 2FA browser extensions leaving this method of cybersecurity practically useless with all things having been considered and taken into account.
It will be interesting to see where things go from here on out, since this malware has the potential to cause widespread harm. This also further reveals why it’s usually not a good idea to try to download cracked software, since there is an entire industry based around hoodwinking people that take part in this practice.
The developer of this malware, Lumma, may actually be a notorious malicious actor named Shamel. This threat actor has evaded detection, and is continuing to sell this malware to countless other buyers that have now made their way to YouTube to target unsuspecting users.
Read next: Broadband Market Expected to Nearly Double by 2030