
Microsoft Raises Alarm Over Widespread Lumma Malware Threat
In a recent blog post, Microsoft has unveiled alarming statistics regarding the impact of malware on Windows systems. The company reported that within a short span of two months—from March 16, 2025, to May 16, 2025—over 394, 000 Windows devices globally have fallen victim to an information-stealing malware known as “Lumma.”
Understanding Lumma: A Malware-as-a-Service Threat
Lumma, also referred to as LummaC2, is a sophisticated “malware-as-a-service”(MaaS) solution developed by the hacking group Storm-2477. Cybercriminals have employed Lumma primarily to pilfer sensitive data from various applications, including popular web browsers and cryptocurrency wallets.
Distribution and Infection Tactics of Lumma
Microsoft detailed the various malicious distribution methods that have facilitated Lumma’s reach. These include:
- Phishing Emails: Deceptive emails designed to trick recipients into downloading malware.
- Malvertising: Fake advertisements aimed at spreading the malicious software.
- Drive-by Downloads: Exploiting compromised websites to unknowingly install malware onto visitors’ devices.
- Trojans: Legitimate-looking applications that conceal the malware.
- Fake CAPTCHAs: Misleading prompts that lead users into malware traps.
For instance, users have been misled into downloading fakes labeled as “Notepad++” or “Chrome updates.” To prevent falling prey to such tactics, individuals are urged to always download software directly from official sources.
Persistence of Lumma’s Threat
Even if users obtain software securely, Lumma remains a persistent threat. The malware can infiltrate systems through various vectors once it successfully breaches defenses, affecting popular Chromium-based browsers such as Google Chrome and Microsoft Edge, as well as Mozilla Firefox.
Capabilities of Lumma Malware
Microsoft has outlined the extensive capabilities of Lumma in stealing sensitive data:
- Browser Credentials and Cookies: Extracts saved passwords and session cookies from major browsers.
- Cryptocurrency Wallets: Targets wallet files and extensions, searching for sensitive keys.
- Various Applications: Harvests information from VPNs, email clients, FTP clients, and messaging applications.
- User Documents: Collects files from user directories, especially those with.pdf and.docx formats.
- System Metadata: Gathers telemetry data to assist in crafting future attacks.
Global Impact and Infection Heat Map
According to a heat map shared by Microsoft, the devastation caused by Lumma is particularly pronounced in regions such as Europe, the eastern United States, and various parts of India, underscoring the global nature of this threat:

Defensive Measures by Microsoft
Fortunately, there is a silver lining. Microsoft has confirmed that its Defender antivirus software can now detect LummaC2. The malware will be flagged under several suspicious behaviors and Trojan classifications:
- Behavior:Win32/LuammaStealer
- Trojan:JS/LummaStealer
- Trojan:MSIL/LummaStealer
- Trojan:Win32/LummaStealer
- Trojan:Win64/LummaStealer
- TrojanDropper:Win32/LummaStealer
- Trojan:PowerShell/Powdow
- Trojan:Win64/Shaolaod
- Behavior:Win64/Shaolaod
- Behavior:Win32/MaleficAms
- Behavior:Win32/ClickFix
- Behavior:Win32/SuspClickFix
- Trojan:Win32/ClickFix
- Trojan:Script/ClickFix
- Behavior:Win32/RegRunMRU
- Trojan:HTML/FakeCaptcha
- Trojan:Script/SuspDown
Similar capabilities are available through Defender for Office 365 and Defender for Endpoint. For more detailed technical insights regarding Lumma, you can access Microsoft’s official blog post here and the related announcement here.
Leave a Reply