Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsOnce-Hobbled Lumma Stealer Is Back with Lures that Are Hard to Resist
Once-Hobbled Lumma Stealer Is Back with Lures that Are Hard to Resist
DefenseCybersecurity

Once-Hobbled Lumma Stealer Is Back with Lures that Are Hard to Resist

•February 11, 2026
0
Ars Technica – Security
Ars Technica – Security•Feb 11, 2026

Companies Mentioned

Bitdefender

Bitdefender

Discord

Discord

Microsoft

Microsoft

MSFT

Binance

Binance

Yahoo

Yahoo

Why It Matters

The resurgence demonstrates the limits of takedown operations against adaptable malware‑as‑a‑service ecosystems, raising fresh risk for enterprises and consumers alike.

Key Takeaways

  • •Lumma stealer resurfaces after massive 2025 takedown
  • •ClickFix lures use fake CAPTCHAs to execute code
  • •CastleLoader runs memory‑only, evading traditional scanners
  • •Threat actors abuse trusted CDNs like Steam and Discord

Pulse Analysis

The revival of Lumma underscores a broader trend: cybercrime groups are increasingly treating malware as a subscription service, rebuilding infrastructure faster than authorities can dismantle it. By offering a turnkey platform that includes lure sites, command‑and‑control servers, and payload delivery, operators can monetize stolen credentials at scale. Law‑enforcement seizures of thousands of domains provide only temporary disruption, as the underlying business model is designed for rapid replication across new hosting providers and cloud services.

ClickFix, the social‑engineering vector driving the latest wave, exploits procedural trust rather than software flaws. Victims are prompted to copy malicious text into the Windows Run dialog, effectively executing a loader without realizing they are running code. The subsequent CastleLoader resides solely in memory and employs heavy obfuscation, making it invisible to signature‑based antiviruses and challenging for endpoint detection and response tools. Its flexible command‑and‑control channel further complicates network‑based detection, allowing attackers to adapt payloads on the fly.

For organizations, the resurgence of Lumma signals the need for layered defenses beyond perimeter security. User education must emphasize skepticism toward unsolicited “free‑download” sites and unexpected CAPTCHAs, while technical controls should enforce privileged‑execution policies, such as requiring passwords for terminal access. Monitoring for anomalous PowerShell or command‑line activity, especially from browsers, can catch the early stages of ClickFix attacks. Ultimately, a combination of threat‑intel sharing, robust endpoint protection, and continuous security awareness training will be essential to mitigate the evolving threat posed by malware‑as‑a‑service platforms like Lumma.

Once-hobbled Lumma Stealer is back with lures that are hard to resist

Dan Goodin · Senior Security Editor, Ars Technica

Follow on Mastodon • Follow on Bluesky • Signal: DanArs.82


Last May, law‑enforcement authorities around the world scored a key win when they hobbled the infrastructure of Lumma, an infostealer that infected nearly 395,000 Windows computers over just a two‑month span leading up to the international operation. Researchers said Wednesday that Lumma is once again “back at scale” in hard‑to‑detect attacks that pilfer credentials and sensitive files.

Lumma, also known as Lumma Stealer, first appeared in Russian‑speaking cybercrime forums in 2022. Its cloud‑based malware‑as‑a‑service model provided a sprawling infrastructure of domains for hosting lure sites offering free cracked software, games, and pirated movies, as well as command‑and‑control channels and everything else a threat actor needed to run their infostealing enterprise. Within a year, Lumma was selling for as much as $2,500 for premium versions. By the spring of 2024, the FBI counted more than 21,000 listings on crime forums. Last year, Microsoft said Lumma had become the “go‑to tool” for multiple crime groups, including Scattered Spider, one of the most prolific groups.

Takedowns are hard

The FBI and an international coalition of its counterparts took action early last year. In May, they said they seized 2,300 domains, command‑and‑control infrastructure, and crime marketplaces that had enabled the infostealer to thrive. Recently, however, the malware has made a comeback, allowing it to infect a significant number of machines again.

“LummaStealer is back at scale, despite a major 2025 law‑enforcement takedown that disrupted thousands of its command‑and‑control domains,” researchers from security firm Bitdefender wrote. “The operation has rapidly rebuilt its infrastructure and continues to spread worldwide.”

As with Lumma before, the recent surge leans heavily on ClickFix, a form of social‑engineering lure that’s proving to be vexingly effective in causing end users to infect their own machines. Typically, these types of bait come in the form of fake CAPTCHAs that—rather than requiring users to click a box or identify objects or letters in a jumbled image—instruct them to copy text and paste it into an interface, a process that takes just seconds. The text comes in the form of malicious commands provided by the fake CAPTCHA. The interface is the Windows terminal. Targets who comply then install loader malware, which in turn installs Lumma.

A core part of the resurgence is the use of CastleLoader, a separate piece of malware that’s installed initially. It runs solely in memory, making it much harder to detect than malware that resides on a hard drive. Its code is heavily obfuscated, making it hard to spot its malice even when malware scanners can see it. CastleLoader also provides a flexible and full‑featured command‑and‑control communication mechanism that users can customize to meet their specific needs.

CastleLoader shares some of Lumma’s recently rebuilt infrastructure, an indication that the operators are working together or at least coordinating their activities. In other cases, Lumma relies on legitimate infrastructure—mostly from the content delivery networks Steam Workshop and Discord shared files—to be installed. The use of trusted platforms helps lower targets’ suspicions. In either case, once the loader is executed, it surreptitiously burrows into the infected machine and, after lowering defenses, installs its second payload: Lumma.

It’s so easy to fall for ClickFix

People have grown so accustomed to hard‑to‑solve CAPTCHAs that they think little when instructed to copy website‑provided text, click the Win‑R keys, and then choose paste. Once this simple action is performed, Lumma has free rein over a host of sensitive files stored on infected machines. Bitdefender said the data includes:

  • Credentials saved in web browsers

  • Cookies

  • Personal documents (.docx, .pdf, etc.)

  • Sensitive files containing financial information, secret keys (including cloud keys), 2FA backup codes, and server passwords, as well as cryptocurrency private keys and wallet data

  • Personal data such as ID numbers, addresses, medical records, credit card numbers, and dates of birth

  • Cryptocurrency wallets and browser extensions associated with popular services like MetaMask, Binance, Electrum, Ethereum, Exodus, Coinomi, Bitcoin Core, JAXX, and Steem Keychain

  • Data from remote access tools and password managers, specifically AnyDesk and KeePass

  • Two‑factor authentication (2FA) tokens and extensions such as Authenticator, Authy, EOS Authenticator, GAuth Authenticator, and Trezor Password Manager

  • Information from VPNs (.ovpn files), various email clients (Gmail, Outlook, Yahoo), and FTP clients

  • System metadata, including CPU information, operating system version (Windows 7 to Windows 11), system locale, installed applications, username, hardware ID, and screen resolution, useful for profiling victims or tailoring future exploits

“The effectiveness of ClickFix lies in its abuse of procedural trust rather than technical vulnerabilities,” Bitdefender said. “The instructions resemble troubleshooting steps or verification workarounds that users may have encountered previously. As a result, victims often fail to recognize that they are manually executing arbitrary code on their own system.”

While Lumma is targeting only Windows users, other malware campaigns have used the same technique to infect macOS machines since at least last June. More recent ClickFix attacks on macOS users have continued into this year.

The best defense against ClickFix is to steer clear of sites offering free stuff. Windows and macOS provide a means to require a password before the command terminals can be opened. People with technical skills who administer machines on behalf of less experienced users may want to consider using this latter defense as well.

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...