• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

News FBI hit LummaStealer and to its clients

dEEpEst

☣☣ In The Depths ☣☣
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Mar 29, 2018
Messages
13,861
Solutions
4
Reputation
27
Reaction score
45,548
Points
1,813
Credits
55,350
‎7 Years of Service‎
 
56%
Reportedly, customers of LummaStealer have received messages on telegram from law enforcement claiming to have obtained user info and log files. Also FBI seizure banners are being displayed on known Lumma affiliated domains.

20250522-092918.jpg


20250522-092914.jpg
 
Seems like some #Lumma Stealer panels have started to display a banner of seizure

/tsoi-zhiv.com
/anna-akhmatova.com

20250522-094420.jpg



20250522-094422.jpg
 

Disrupting Lumma Stealer: Microsoft leads global action against favored cybercrime tool​


Microsoft’s Digital Crimes Unit (DCU) and international partners are disrupting the leading tool used to indiscriminately steal sensitive personal and organizational information to facilitate cybercrime. On Tuesday, May 13, Microsoft’s DCU filed a legal action against
This link is hidden for visitors. Please Log in or register now.
(“Lumma”), which is the favored info-stealing malware used by hundreds of cyber threat actors. Lumma steals passwords, credit cards, bank accounts, and cryptocurrency wallets and has enabled criminals to hold schools for ransom, empty bank accounts, and disrupt critical services.
Via a court order granted in the United States District Court of the Northern District of Georgia, Microsoft’s DCU seized and facilitated the takedown, suspension, and blocking of approximately 2,300 malicious domains that formed the backbone of Lumma’s infrastructure. The
This link is hidden for visitors. Please Log in or register now.
(DOJ) simultaneously seized the central command structure for Lumma and disrupted the marketplaces where the tool was sold to other cybercriminals.
This link is hidden for visitors. Please Log in or register now.
(EC3) and Japan’s
This link is hidden for visitors. Please Log in or register now.
(JC3) facilitated the suspension of locally based Lumma infrastructure.
Between March 16, 2025, and May 16, 2025, Microsoft identified over 394,000 Windows computers globally infected by the Luma malware. Working with law enforcement and industry partners, we have severed communications between the malicious tool and victims. Moreover, more than 1,300 domains seized by or transferred to Microsoft, including 300 domains actioned by law enforcement with the support of Europol, will be redirected to Microsoft sinkholes. This will allow Microsoft’s DCU to provide actionable intelligence to continue to harden the security of the company’s services and help protect online users. These insights will also assist public- and private-sector partners as they continue to track, investigate, and remediate this threat. This joint action is designed to slow the speed at which these actors can launch their attacks, minimize the effectiveness of their campaigns, and hinder their illicit profits by cutting a major revenue stream.
This link is hidden for visitors. Please Log in or register now.
Heat map detailing global spread of Lumma Stealer malware infections and encounters across Windows devices.
 
FBI got access to #LummaC2 panel and the private chat?! 👀🕊️

20250522-104119.jpg
 
Una nueva version en camino... Tic tac
 
Como con Lokibot
 
Back
Top