LummaC2, also known as Lumma Stealeris a dangerous stealer written in the C programming language. Since 2022, it has been sold as Malware-as-a-Service (Maas) on Dark Web forums or Telegram channels.
It mainly targets cryptocurrency wallets, browser extensions and two-factor authentication (2FA), performing credential collection and exfiltration.
The common methods used to distribute Lumma are:
– fake software (users are tricked into downloading and installing malware through malvertising or fake web pages).
– Phishing attacks (malicious e-mail attachments. This is the most common scenario for malware distribution).
– Direct Messages (via forums or messaging applications).
Today's report focuses on the analysis of version 4.0 of the latest LummaC2 malware family.
If you wish to learn more, here is the link to our full report.
In addition, you can subscribe to the specific mailing list to receive updates on upcoming reports: