Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsCTM360: Lumma Stealer and Ninja Browser Malware Campaign Abusing Google Groups
CTM360: Lumma Stealer and Ninja Browser Malware Campaign Abusing Google Groups
CybersecurityDefense

CTM360: Lumma Stealer and Ninja Browser Malware Campaign Abusing Google Groups

•February 15, 2026
0
BleepingComputer
BleepingComputer•Feb 15, 2026

Companies Mentioned

Google

Google

GOOG

Why It Matters

The abuse of Google’s SaaS ecosystem lets attackers bypass conventional security controls, exposing enterprises to credential theft, account takeover, and long‑term persistence across both Windows and Linux endpoints.

Key Takeaways

  • •Over 4,000 malicious Google Groups used
  • •Campaign delivers Lumma Stealer to Windows, Ninja Browser to Linux
  • •Oversized archive evades AV by padding with null bytes
  • •Malicious Chrome extension harvests credentials silently
  • •Attack leverages Google Docs/Drive redirects to bypass filters

Pulse Analysis

The rise of SaaS‑based weaponization is reshaping threat landscapes, and Google’s ubiquitous services are now prime delivery vectors. By infiltrating industry‑focused Google Groups, adversaries exploit the platform’s inherent trust to seed malicious links that appear legitimate to end users. The scale—thousands of compromised groups and URLs—demonstrates a coordinated effort to reach a global audience, leveraging Google’s domain reputation to sidestep email gateways and web proxies that typically block unknown hosts.

On the technical side, the campaign distinguishes itself with dual‑platform payloads. Windows victims receive a 950 MB archive padded with null bytes, a clever tactic that pushes the file size beyond many static analysis thresholds while the actual malicious component remains a modest 33 MB. An AutoIt‑driven loader then reconstructs the binary, decrypts it in memory, and initiates the Lumma Info‑Stealer, which siphons browser credentials, session cookies, and executes remote commands. Linux users are presented with a counterfeit “Ninja Browser” that silently installs a malicious extension, tracks identifiers, injects scripts, and creates scheduled tasks for persistent command‑and‑control polling. Both vectors benefit from Google Docs and Drive redirectors that dynamically serve OS‑specific payloads, further complicating detection.

Enterprises must adapt their defenses to this SaaS‑centric threat model. Beyond traditional URL filtering, security teams should monitor for anomalous Google Group activity, inspect shortened URLs, and enforce strict controls on browser extension installations. Endpoint Detection and Response (EDR) solutions need to flag unusual archive sizes and AutoIt execution patterns, while SIEMs should correlate scheduled‑task creation with known malicious domains such as healgeni.live. By combining user education with proactive IoC blocking, organizations can mitigate the risk of credential harvesting and long‑term persistence introduced by this sophisticated campaign.

CTM360: Lumma Stealer and Ninja Browser malware campaign abusing Google Groups

LummaStealer + Ninja Browser malware campaign

CTM360 reports that more than 4,000 malicious Google Groups and 3,500 Google‑hosted URLs are being used in an active malware campaign targeting global organizations.

The attackers abuse Google’s trusted ecosystem to distribute credential‑stealing malware and establish persistent access on compromised devices.

The activity is global, with attackers embedding organization names and industry‑relevant keywords into posts to increase credibility and drive downloads.

Read the full report here: https://www.ctm360.com/reports/ninja-browser-lumma-infostealer


How the campaign works

The attack chain begins with social engineering inside Google Groups. Threat actors infiltrate industry‑related forums and post technical discussions that appear legitimate, covering topics such as network issues, authentication errors, or software configurations.

Within these threads, attackers embed download links disguised as: “Download {Organization_Name} for Windows 10”.

To evade detection, they use URL shorteners or Google‑hosted redirectors via Docs and Drive. The redirector is designed to detect the victim’s operating system and deliver different payloads depending on whether the target is using Windows or Linux.


Windows Infection Flow: Lumma Info‑Stealer

For Windows users, the campaign delivers a password‑protected compressed archive hosted on a malicious file‑sharing infrastructure.

Oversized archive to evade detection

The decompressed archive size is approximately 950 MB, though the actual malicious payload is only around 33 MB. CTM360 researchers found that the executable was padded with null bytes — a technique designed to exceed antivirus file‑size scanning thresholds and disrupt static analysis engines.

AutoIt‑based reconstruction

Once executed, the malware:

  • Reassembles segmented binary files.

  • Launches an AutoIt‑compiled executable.

  • Decrypts and executes a memory‑resident payload.

The behavior matches Lumma Stealer, a commercially sold infostealer frequently used in credential‑harvesting campaigns.

Observed behavior includes:

  • Browser credential exfiltration.

  • Session cookie harvesting.

  • Shell‑based command execution.

  • HTTP POST requests to C2 infrastructure (e.g., healgeni.live).

  • Use of multipart/form‑data POST requests to mask exfiltrated content.

CTM360 identified multiple associated IP addresses and SHA‑256 hashes linked to the Lumma‑stealer payload.


Linux Infection Flow: Trojanized “Ninja Browser”

Linux users are redirected to download a trojanized Chromium‑based browser branded as “Ninja Browser.”

The software presents itself as a privacy‑focused browser with built‑in anonymity features.

CTM360’s analysis reveals that it silently installs malicious extensions without user consent and implements hidden persistence mechanisms that enable future compromise by the threat actor.

Malicious extension behavior

A built‑in extension named “NinjaBrowserMonetisation” was observed to:

  • Track users via unique identifiers.

  • Inject scripts into web sessions.

  • Load remote content.

  • Manipulate browser tabs and cookies.

  • Store data externally.

The extension contains heavily obfuscated JavaScript using XOR and Base56‑like encoding. While not immediately activating all embedded domains, the infrastructure suggests future payload deployment capability.

Silent persistence mechanism

CTM360 also identified scheduled tasks configured to:

  • Poll attacker‑controlled servers daily.

  • Silently install updates without user interaction.

  • Maintain long‑term persistence.

Researchers observed that the browser defaults to a Russian‑based search engine named “X‑Finder” and redirects to another suspicious AI‑themed search page.

The infrastructure appears tied to domains such as:

  • ninja-browser.com

  • nb-download.com

  • nbdownload.space


Campaign Infrastructure & Indicators of Compromise

IPs

  • 152.42.139.18

  • 89.111.170.100

C2 domain

  • healgeni.live

Multiple SHA‑256 hashes and additional domains associated with credential harvesting and info‑stealer distribution were identified in the full report.


Risks to organizations

Lumma Stealer risks

  • Credential and session token theft

  • Account takeover

  • Financial fraud

  • Lateral movement in enterprise environments

Ninja Browser risks

  • Silent credential harvesting

  • Remote command execution

  • Backdoor‑like persistence

  • Automatic malicious updates without user consent

Because the campaign abuses Google‑hosted services, the attack bypasses traditional trust‑based filtering mechanisms and increases user confidence in malicious content.


Defensive recommendations

  • Inspect shortened URLs and Google Docs/Drive redirect chains.

  • Block the IoCs at firewall and EDR levels.

  • Educate users against downloading software from public forums/sources without verification.

  • Monitor scheduled task creation on endpoints.

  • Audit browser extension installations.

The campaign highlights a broader trend: attackers are increasingly weaponizing trusted SaaS platforms as delivery infrastructure to evade detection.


About the Research

The findings were published in CTM360’s February 2026 threat intelligence report, “Ninja Browser & Lumma Infostealer Delivered via Weaponized Google Services.”

CTM360 continues to monitor this activity and track related infrastructure.

Read the full report here: https://www.ctm360.com/reports/ninja-browser-lumma-infostealer

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...