Click to chat
  • Solutions
    • Solutions
    • Artificial Intelligence
    • Data Analytics
    • Epicor for Distribution
    • Epicor for Manufacturing
    • IT Support
    • Managed Services
    • Microsoft 365
    • Microsoft Azure
    • Microsoft Licensing Support
    • Security
  • Innovation
    • Innovation
    • AI for Epicor
    • Cybersecurity
    • Data Analytics
    • Epicor in Azure
    • Epicor Kinetic ERP
    • Microsoft 365
    • Microsoft Azure
    • SaaS
  • Helpdesk
  • Resources
    • Resources
      • Resources
      • 2W Conversations
      • News Releases
      • Product Demo’s
      • Quick Tech Talks
      • Webinars
    • Blogs
  • About 2W
    • About Us
    • Contact Us
    • IT News
  • Join the Team
  • Client Login
  • Solutions
    • Solutions
    • Artificial Intelligence
    • Data Analytics
    • Epicor for Distribution
    • Epicor for Manufacturing
    • IT Support
    • Managed Services
    • Microsoft 365
    • Microsoft Azure
    • Microsoft Licensing Support
    • Security
  • Innovation
    • Innovation
    • AI for Epicor
    • Cybersecurity
    • Data Analytics
    • Epicor in Azure
    • Epicor Kinetic ERP
    • Microsoft 365
    • Microsoft Azure
    • SaaS
  • Helpdesk
  • Resources
    • Resources
      • Resources
      • 2W Conversations
      • News Releases
      • Product Demo’s
      • Quick Tech Talks
      • Webinars
    • Blogs
  • About 2W
    • About Us
    • Contact Us
    • IT News
  • Join the Team
  • Client Login
Contact Us
Home / IT News / New Phishing Campaign Targets Windows Users with Lumma Stealer

New Phishing Campaign Targets Windows Users with Lumma Stealer

09/20/24
Categories:
  • CloudSec
  • Cybersecurity
  • Lumma Stealer

Cybersecurity researchers at CloudSec have uncovered a new phishing campaign aimed at deceiving Windows users into executing harmful commands via fraudulent CAPTCHA verification pages. This malicious operation seeks to install the Lumma Stealer malware, which can compromise sensitive information.

How the Attack Works

Cybercriminals are setting up phishing websites across various platforms such as Amazon S3 and Content Delivery Networks (CDNs). These sites replicate genuine verification pages, including fake Google CAPTCHA forms. When users click the “Verify” button, they receive unusual instructions:

  1. Open the Run dialog (Win + R)
  2. Press Ctrl + V
  3. Hit Enter

Unbeknownst to the user, these steps trigger a hidden JavaScript function that copies a base64-encoded PowerShell command to the clipboard. When the command is pasted and executed, it retrieves the Lumma Stealer malware from a remote server.

According to CloudSec’s report, which was shared with Hackread.com, the downloaded malware often installs additional malicious components, complicating detection, and removal efforts. While the current campaign focuses on Lumma Stealer, this method can easily be adapted for other malware variants.

Lumma Stealer Overview

The Lumma Stealer is engineered to extract sensitive data from infected devices. The specific data targeted can vary but frequently includes login credentials, financial details, and personal files. This recent campaign emerged shortly after the malware was reported as disguising itself as an OnlyFans hacker tool, which infected the devices of several hackers.

Earlier in 2024, Lumma was found to spread through cracked software shared via compromised YouTube channels. Additionally, in November 2023, researchers identified a recent version of LummaC2, known as LummaC2 v4.0, utilizing trigonometric methods to detect human users for its data-stealing operations.

With the new Lumma stealer threat emerging, it is crucial for both businesses and users to remain vigilant against deceptive verification scams. Here are some practical tips for protection against Lumma and similar malware:

  1. Educate Yourself and Others: Share information about this threat with friends, family, and colleagues to raise awareness.
  2. Be Cautious of Unusual Requests: Legitimate sites rarely ask users to run commands via the “Run” dialog. Be skeptical of such requests.
  3. Avoid Unknown Commands: Do not copy or paste commands from untrusted sources, particularly those intended for a terminal or command prompt.
  4. Keep Software Updated: Regularly update your operating system and antivirus software to protect against known vulnerabilities.
  5. Stay Informed: Follow reliable cybersecurity news sources like Hackread.com for the latest updates.

Stay informed and take necessary precautions to protect your sensitive information against these emerging threats.

Read More:

Artificial Intelligence and Machine Learning Propel Innovation

The Importance of Cybersecurity Awareness and Training

Back to IT News

Copyright © 2025, 2W Technologies, Inc.

2W Tech is a leading technology service provider specializing in cutting-edge solutions for the manufacturing and distribution industry, including Epicor ERP, Epicor P21, IT support and infrastructure, Azure cloud services, Microsoft 365, cybersecurity, artificial intelligence, data analytics, and comprehensive managed technology programs.

Epicor in AzureTM and ResolveIQTM are registered trademarks of 2W Technologies, INC.

As an esteemed Epicor Platinum Elite Partner and a Microsoft Tier 1 Cloud Services Partner, we are dedicated to delivering unparalleled service and support. For more information, please contact us at 262-686-5070 or visit our website here.