
The resurgence demonstrates the limits of takedown operations against adaptable malware‑as‑a‑service ecosystems, raising fresh risk for enterprises and consumers alike.
The revival of Lumma underscores a broader trend: cybercrime groups are increasingly treating malware as a subscription service, rebuilding infrastructure faster than authorities can dismantle it. By offering a turnkey platform that includes lure sites, command‑and‑control servers, and payload delivery, operators can monetize stolen credentials at scale. Law‑enforcement seizures of thousands of domains provide only temporary disruption, as the underlying business model is designed for rapid replication across new hosting providers and cloud services.
ClickFix, the social‑engineering vector driving the latest wave, exploits procedural trust rather than software flaws. Victims are prompted to copy malicious text into the Windows Run dialog, effectively executing a loader without realizing they are running code. The subsequent CastleLoader resides solely in memory and employs heavy obfuscation, making it invisible to signature‑based antiviruses and challenging for endpoint detection and response tools. Its flexible command‑and‑control channel further complicates network‑based detection, allowing attackers to adapt payloads on the fly.
For organizations, the resurgence of Lumma signals the need for layered defenses beyond perimeter security. User education must emphasize skepticism toward unsolicited “free‑download” sites and unexpected CAPTCHAs, while technical controls should enforce privileged‑execution policies, such as requiring passwords for terminal access. Monitoring for anomalous PowerShell or command‑line activity, especially from browsers, can catch the early stages of ClickFix attacks. Ultimately, a combination of threat‑intel sharing, robust endpoint protection, and continuous security awareness training will be essential to mitigate the evolving threat posed by malware‑as‑a‑service platforms like Lumma.
Dan Goodin · Senior Security Editor, Ars Technica
Follow on Mastodon • Follow on Bluesky • Signal: DanArs.82
Last May, law‑enforcement authorities around the world scored a key win when they hobbled the infrastructure of Lumma, an infostealer that infected nearly 395,000 Windows computers over just a two‑month span leading up to the international operation. Researchers said Wednesday that Lumma is once again “back at scale” in hard‑to‑detect attacks that pilfer credentials and sensitive files.
Lumma, also known as Lumma Stealer, first appeared in Russian‑speaking cybercrime forums in 2022. Its cloud‑based malware‑as‑a‑service model provided a sprawling infrastructure of domains for hosting lure sites offering free cracked software, games, and pirated movies, as well as command‑and‑control channels and everything else a threat actor needed to run their infostealing enterprise. Within a year, Lumma was selling for as much as $2,500 for premium versions. By the spring of 2024, the FBI counted more than 21,000 listings on crime forums. Last year, Microsoft said Lumma had become the “go‑to tool” for multiple crime groups, including Scattered Spider, one of the most prolific groups.
The FBI and an international coalition of its counterparts took action early last year. In May, they said they seized 2,300 domains, command‑and‑control infrastructure, and crime marketplaces that had enabled the infostealer to thrive. Recently, however, the malware has made a comeback, allowing it to infect a significant number of machines again.
“LummaStealer is back at scale, despite a major 2025 law‑enforcement takedown that disrupted thousands of its command‑and‑control domains,” researchers from security firm Bitdefender wrote. “The operation has rapidly rebuilt its infrastructure and continues to spread worldwide.”
As with Lumma before, the recent surge leans heavily on ClickFix, a form of social‑engineering lure that’s proving to be vexingly effective in causing end users to infect their own machines. Typically, these types of bait come in the form of fake CAPTCHAs that—rather than requiring users to click a box or identify objects or letters in a jumbled image—instruct them to copy text and paste it into an interface, a process that takes just seconds. The text comes in the form of malicious commands provided by the fake CAPTCHA. The interface is the Windows terminal. Targets who comply then install loader malware, which in turn installs Lumma.
A core part of the resurgence is the use of CastleLoader, a separate piece of malware that’s installed initially. It runs solely in memory, making it much harder to detect than malware that resides on a hard drive. Its code is heavily obfuscated, making it hard to spot its malice even when malware scanners can see it. CastleLoader also provides a flexible and full‑featured command‑and‑control communication mechanism that users can customize to meet their specific needs.
CastleLoader shares some of Lumma’s recently rebuilt infrastructure, an indication that the operators are working together or at least coordinating their activities. In other cases, Lumma relies on legitimate infrastructure—mostly from the content delivery networks Steam Workshop and Discord shared files—to be installed. The use of trusted platforms helps lower targets’ suspicions. In either case, once the loader is executed, it surreptitiously burrows into the infected machine and, after lowering defenses, installs its second payload: Lumma.
People have grown so accustomed to hard‑to‑solve CAPTCHAs that they think little when instructed to copy website‑provided text, click the Win‑R keys, and then choose paste. Once this simple action is performed, Lumma has free rein over a host of sensitive files stored on infected machines. Bitdefender said the data includes:
Credentials saved in web browsers
Cookies
Personal documents (.docx, .pdf, etc.)
Sensitive files containing financial information, secret keys (including cloud keys), 2FA backup codes, and server passwords, as well as cryptocurrency private keys and wallet data
Personal data such as ID numbers, addresses, medical records, credit card numbers, and dates of birth
Cryptocurrency wallets and browser extensions associated with popular services like MetaMask, Binance, Electrum, Ethereum, Exodus, Coinomi, Bitcoin Core, JAXX, and Steem Keychain
Data from remote access tools and password managers, specifically AnyDesk and KeePass
Two‑factor authentication (2FA) tokens and extensions such as Authenticator, Authy, EOS Authenticator, GAuth Authenticator, and Trezor Password Manager
Information from VPNs (.ovpn files), various email clients (Gmail, Outlook, Yahoo), and FTP clients
System metadata, including CPU information, operating system version (Windows 7 to Windows 11), system locale, installed applications, username, hardware ID, and screen resolution, useful for profiling victims or tailoring future exploits
“The effectiveness of ClickFix lies in its abuse of procedural trust rather than technical vulnerabilities,” Bitdefender said. “The instructions resemble troubleshooting steps or verification workarounds that users may have encountered previously. As a result, victims often fail to recognize that they are manually executing arbitrary code on their own system.”
While Lumma is targeting only Windows users, other malware campaigns have used the same technique to infect macOS machines since at least last June. More recent ClickFix attacks on macOS users have continued into this year.
The best defense against ClickFix is to steer clear of sites offering free stuff. Windows and macOS provide a means to require a password before the command terminals can be opened. People with technical skills who administer machines on behalf of less experienced users may want to consider using this latter defense as well.
Comments
Want to join the conversation?
Loading comments...