Google Cloud Platform Vulnerability Enables Privilege Escalation and Exposure of Sensitive Data
April 2, 2025Rhadamanthys Stealer – Active IOCs
April 3, 2025Google Cloud Platform Vulnerability Enables Privilege Escalation and Exposure of Sensitive Data
April 2, 2025Rhadamanthys Stealer – Active IOCs
April 3, 2025Severity
Medium
Analysis Summary
Lumma is an information stealer that is sold as a Malware-as-a-Service (MaaS) on Russian-speaking underground forums and Telegram. Lumma is an information stealer, which means its primary purpose is to steal sensitive data from infected systems. Lumma is written in the C programming language, which allows for efficient and low-level access to system resources. It is distributed as a service by LummaC, the seller, on Russian-speaking underground forums and Telegram channels. Lumma places a particular emphasis on stealing cryptocurrency wallets. This indicates that the malware is designed to target and extract sensitive information related to cryptocurrency, such as private keys or wallet.dat files. In addition to its focus on cryptocurrency wallets, Lumma also possesses file-grabber capabilities.
To protect against Lumma Stealer and similar threats, it is essential to follow security best practices. This includes regularly updating software and operating systems, using strong and unique passwords, implementing multi-factor authentication, exercising caution when opening email attachments or clicking on suspicious links, and using reputable antivirus/anti-malware solutions. Security awareness training can also help users recognize and avoid phishing attempts.
Impact
- Data Exfiltration
- Credential Theft
- Information Theft
- Financial Loss
Indicators of Compromise
MD5
cf6400282fa5a0311240af20c4654584
1cd47db193c72d972e59cfcc31336aa7
35ad0fe6dcbd070d55acab67c8f7411f
b0a704444c30f85f59c12e85e26a9113
SHA-256
2237953b9b13a18569f81769755c5f56fca19cdae5c43c14462dc7a83f94ab39
d542019c1b2ddb602966fd905e6bbc7caa02309a383ce443ec081b2f0c71122f
22b8db1170ae596615923b16791ffb04586a1be1b39f9f31f9bbb870f3492ce4
fdf80694651dc47b27eb9e4c75e65215ca84e4eb0fc25a28cf8776edde9bf670
SHA1
8563b439acedf8f4c72fcae9cbd4d64cd6548828
9f8f90c096bf65f1c9824f01e5b07d06967ffda5
a9d63734be88192a60440d1ce77510e88aca6906
76e1db47039fb8eb22ea010544f47303d824cdb9
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution. Never trust or open links and attachments received from unknown sources/senders.
- Maintain cyber hygiene by updating your anti-virus software and implementing a patch management lifecycle.
- Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Enable antivirus and anti-malware software and update signature definitions on time. Using multi-layered protection is necessary to secure vulnerable assets.