• Please be sure to read the rules and adhere to them. Some banned members have complained that they are not spammers. But they spammed us. Some even tried to redirect our members to other forums. Duh. Be smart. Read the rules and adhere to them and we will all get along just fine. Cheers. :beer: Link to the rules: https://www.forumsforums.com/threads/forum-rules-info.2974/

Microsoft "disrupts" major Hacking Software Infecting 394,000 Windows Computers

Melensdad

Jerk in a Hawaiian Shirt & SNOWCAT Moderator
Staff member
I'm an Apple guy, so I don't much worry about Windows, but this seems like a massive win. Nearly 400,000 computers worldwide have been identified as being infected with this malware. The malware shares your personal data. I run a program weekly to scan for malware, viruses, bloat, etc. I think if I had a Windows system I'd be running it daily. But if you don't do something, someone is going to get your data.




FULL STORY AT LINK ^^^​

Disrupting Lumma Stealer: Microsoft leads global action against favored cybercrime tool

May 21, 2025
Digital map displaying parts of Europe, Asia, and Africa with regions highlighted in blue and red, possibly indicating different territories or data values.
Microsoft’s Digital Crimes Unit (DCU) and international partners are disrupting the leading tool used to indiscriminately steal sensitive personal and organizational information to facilitate cybercrime. On Tuesday, May 13, Microsoft’s DCU filed a legal action against Lumma Stealer (“Lumma”), which is the favored info-stealing malware used by hundreds of cyber threat actors. Lumma steals passwords, credit cards, bank accounts, and cryptocurrency wallets and has enabled criminals to hold schools for ransom, empty bank accounts, and disrupt critical services.
Via a court order granted in the United States District Court of the Northern District of Georgia, Microsoft’s DCU seized and facilitated the takedown, suspension, and blocking of approximately 2,300 malicious domains that formed the backbone of Lumma’s infrastructure. The Department of Justice (DOJ) simultaneously seized the central command structure for Lumma and disrupted the marketplaces where the tool was sold to other cybercriminals. Europol’s European Cybercrime Center (EC3) and Japan’s Cybercrime Control Center (JC3) facilitated the suspension of locally based Lumma infrastructure.
Between March 16, 2025, and May 16, 2025, Microsoft identified over 394,000 Windows computers globally infected by the Luma malware. Working with law enforcement and industry partners, we have severed communications between the malicious tool and victims. Moreover, more than 1,300 domains seized by or transferred to Microsoft, including 300 domains actioned by law enforcement with the support of Europol, will be redirected to Microsoft sinkholes. This will allow Microsoft’s DCU to provide actionable intelligence to continue to harden the security of the company’s services and help protect online users. These insights will also assist public- and private-sector partners as they continue to track, investigate, and remediate this threat. This joint action is designed to slow the speed at which these actors can launch their attacks, minimize the effectiveness of their campaigns, and hinder their illicit profits by cutting a major revenue stream.
Heat map showing the global spread of Lumina Strepter. Areas in red indicate regions with a high number of infections and encounters, while areas in blue represent lower levels of activity.Heat map detailing global spread of Lumma Stealer malware infections and encounters across Windows devices.Seizure notice banner stating that the website domain has been seized by Microsoft, in collaboration with Europol EC3, Orrick, BitSight, Cloudflare, Lumen, ESET, and CleanDNS. The image includes logos of these organizations and outlines Microsoft's commitment to combating cybercrime, including legal action against operators involved in stealing financial data, user credentials, and distributing malwareSplash page displayed on 900+ domains seized by Microsoft.

What is Lumma?

Lumma is a Malware-as-a-Service (MaaS), marketed and sold through underground forums since at least 2022. Over the years, the developers released multiple versions to continually improve its capabilities. Microsoft Threat Intelligence shares more details around the delivery techniques and capabilities of Lumma in a recent blog.
Typically, the goal of Lumma operators is to monetize stolen information or conduct further exploitation for various purposes. Lumma is easy to distribute, difficult to detect, and can be programmed to bypass certain security defenses, making it a go-to tool for cybercriminals and online threat actors, including prolific ransomware actors such as Octo Tempest (Scattered Spider). The malware impersonates trusted brands, including Microsoft, and is deployed via spear-phishing emails and malvertising, among other vectors.
 
The Justice Department apparently is involved in taking over the "marketplace" where your data/credit cards, etc are sold.




  • Microsoft said Wednesday that it broke down the Lumma Stealer malware project with the help of law enforcement officials across the globe.
  • Hackers used the malware to steal passwords, credit cards, bank accounts and cryptocurrency wallets.
  • The U.S. Department of Justice took control of Lumma’s “central command structure” and squashed the online marketplaces where bad actors purchased the malware.
Microsoft said Wednesday that it broke down the Lumma Stealer malware project with the help of law enforcement officials across the globe.

The tech giant said in a blog post that its digital crimes unit discovered over 394,000 Windows computers were infected by the Lumma malware worldwide between March 16 through May 16.

The Lumma malware was a favorite hacking tool used by bad actors, Microsoft said in the post. Hackers used the malware to steal passwords, credit cards, bank accounts and cryptocurrencywallets.
Microsoft said its digital crimes unit was able to dismantle the web domains underpinning Lumma’s infrastructure with the help of a court order from the U.S. District Court for the Northern District of Georgia.
The U.S. Department of Justice then took control of Lumma’s “central command structure” and squashed the online marketplaces where bad actors purchased the malware.

STORY CONTINUES at the CNBC link above ^^^
 
Top