Law enforcement agencies and tech companies collaborate to disrupt the infostealer malware Lumma, extensively used by cybercriminals to steal sensitive information.
Microsoft's Digital Crimes Unit obtained a court order to seize Lumma-related domains, with US DOJ seizing its command and control infrastructure.
The malware is known for being easy to distribute, hard to detect, and capable of bypassing security defenses, favored by cybercriminal groups like Scattered Spider.
Lumma infected over 394,000 Windows computers in a two-month period and was prominent on cybercrime forums in 2024.
Law enforcement, with tech companies like Cloudflare, coordinated to disrupt Lumma's infrastructure, preventing its quick recovery by developers.
Infostealers like Lumma have become a primary tool for cybercriminals, facilitating data theft that acts as a precursor to high-impact attacks.
Developers continually enhance Lumma, with recent efforts involving AI integration to automate data processing.
Microsoft identifies Lumma's main developer as 'Shamel' operating in Russia, offering customized malware services on chat forums.
Instances of Lumma being used in attacks on major entities like Caesars Entertainment and PowerSchool have surfaced, showcasing its widespread impact.
Although law enforcement actions target infostealers like Lumma, their prevalence and usefulness suggest continued existence in cybercriminal operations.