Fake Google Ads Used in Malvertising Scam to Hijack Microsoft Advertising Accounts – Active IOCs
February 2, 2025Mirai Botnet aka Katana – Active IOCs
February 3, 2025Fake Google Ads Used in Malvertising Scam to Hijack Microsoft Advertising Accounts – Active IOCs
February 2, 2025Mirai Botnet aka Katana – Active IOCs
February 3, 2025Severity
Medium
Analysis Summary
Lumma is an information stealer that is sold as a Malware-as-a-Service (MaaS) on Russian-speaking underground forums and Telegram. Lumma is an information stealer, which means its primary purpose is to steal sensitive data from infected systems. Lumma is written in the C programming language, which allows for efficient and low-level access to system resources. It is distributed as a service by LummaC, the seller, on Russian-speaking underground forums and Telegram channels. Lumma places a particular emphasis on stealing cryptocurrency wallets. This indicates that the malware is designed to target and extract sensitive information related to cryptocurrency, such as private keys or wallet.dat files. In addition to its focus on cryptocurrency wallets, Lumma also possesses file-grabber capabilities.
To protect against Lumma Stealer and similar threats, it is essential to follow security best practices. This includes regularly updating software and operating systems, using strong and unique passwords, implementing multi-factor authentication, exercising caution when opening email attachments or clicking on suspicious links, and using reputable antivirus/anti-malware solutions. Security awareness training can also help users recognize and avoid phishing attempts.
Impact
- Data Exfiltration
- Credential Theft
- Information Theft
- Financial Loss
Indicators of Compromise
MD5
a26658b12eec0615011bdde9c3fdad94
7b3e707a6a9aebe2ee1c787797b3453f
8f8b6c54e6abc14ae75a4416ecadad0d
SHA-256
bd70ed9867923cb6c248e582981563631e3ca3edc73813a961f4a1feb79a6b03
a370b743e1f1ecc8fb98e68c6f0ef9d4c1744914846cb7363063a4662f869362
b07c350afe713240c8697068b0a1bc43b24cb7882f3716dc06c67bb0fb5addad
SHA1
3267d7f8f2d26c596285afb90e4aa2329be3f46f
a2c22bea396643b85be71236753697128a7aff8b
096dac0e98112e153fa1aa8a38b3c47ad06efbf9
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution. Never trust or open links and attachments received from unknown sources/senders.
- Maintain cyber hygiene by updating your anti-virus software and implementing a patch management lifecycle.
- Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Enable antivirus and anti-malware software and update signature definitions on time. Using multi-layered protection is necessary to secure vulnerable assets.