More than 394,000 Windows computers infected with data-stealing Lumma malware

In a new blog post, Microsoft has released some troubling malware numbers. The company warns that Lumma — a piece of information-stealing malware — has infected more than 394,000 Windows systems globally in just two months, from March 16, 2025 to May 16, 2025 .

 

According to Microsoft, Lumma Stealer (also known as LummaC2 ) is a malware-as-a-service (MaaS) developed by the Storm-2477 hacker group . Hackers have used Lumma to steal sensitive data from applications such as browsers, cryptocurrency wallets, and many other sources.

The tech giant also explained how Lumma is distributed through malicious campaigns including:

  1. Phishing Email
  2. Malvertising
  3. Drive-by downloads from compromised websites
  4. Fake apps contain malware
  5. Fake CAPTCHAs Fool Users

For example, in the case of malvertising , Microsoft points out that fake ads such as 'Download Notepad++' or 'Update Chrome' are used to lure victims. To avoid this trap, users should download applications only from the developer's official website . However, the risk does not stop there. Even when downloading the browser from a safe source, Lumma can still infiltrate the system through other methods. After a successful infection, Lumma can steal data from both Chromium-based browsers (Chrome, Edge) as well as Gecko-based browsers (Firefox).

Microsoft details Lumma's malicious capabilities as follows:

  1. Browser and cookie information : Extract saved passwords, session cookies, autofill data from Chromium, Edge, Firefox.
  2. Cryptocurrency Wallets and Extensions : Search for wallet files, browser extensions, and local keys related to MetaMask, Electrum, Exodus.
  3. Diverse applications : Steal data from VPN (.ovpn), email applications, FTP, Telegram.
  4. User Documents : Collect PDF, DOCX, RTF files from personal folders.
  5. System Information : Collect data such as CPU, OS version, installed applications to customize attacks later.

 

In the heat map below, Microsoft shows Lumma's wide reach, concentrated in Europe, the eastern United States, and parts of India :

More than 394,000 Windows computers infected with data-stealing Lumma malware Picture 1

There is some good news, though. Microsoft claims that Defender — its antivirus engine — was able to detect LummaC2 through warnings flagging it as a Trojan or displaying the following suspicious behavior:

  1. Behavior:Win32/LuammaStealer
  1. Trojan:JS/LummaStealer
  1. Trojan:MSIL/LummaStealer
  1. Trojan:Win32/LummaStealer
  1. Trojan:Win64/LummaStealer
  1. TrojanDropper:Win32/LummaStealer
  1. Trojan:PowerShell/Powdow
  1. Trojan:Win64/Shaolaod
  1. Behavior:Win64/Shaolaod
  1. Behavior:Win32/MaleficAms
  1. Behavior:Win32/ClickFix
  1. Behavior:Win32/SuspClickFix
  1. Trojan:Win32/ClickFix
  1. Trojan:Script/ClickFix
  1. Behavior:Win32/RegRunMRU
  1. Trojan:HTML/FakeCaptcha
  1. Trojan:Script/SuspDown

Defender for Office 365 and Defender for Endpoint are also getting similar detection updates. You can see technical details about Lumma in the official posts from Microsoft.

4 ★ | 2 Vote

May be interested