techhub.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A hub primarily for passionate technologists, but everyone is welcome

Administered by:

Server stats:

4.6K
active users

#lumma

1 post1 participant0 posts today
Marcel SIneM(S)US<p>Comeback von <a href="https://social.tchncs.de/tags/Lumma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Lumma</span></a> und NoName057(16): <a href="https://social.tchncs.de/tags/Cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybercrime</span></a>-Zerschlagung misslungen | Security <a href="https://www.heise.de/news/Comeback-von-Lumma-und-NoName057-16-Cybercrime-Zerschlagung-misslungen-10498191.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Comeback-von-Lum</span><span class="invisible">ma-und-NoName057-16-Cybercrime-Zerschlagung-misslungen-10498191.html</span></a> <a href="https://social.tchncs.de/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.tchncs.de/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://social.tchncs.de/tags/NoName05716" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NoName05716</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Lumma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Lumma</span></a> <a href="https://mastodon.thenewoil.org/tags/infostealer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infostealer</span></a> <a href="https://mastodon.thenewoil.org/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> returns after law enforcement disruption</p><p><a href="https://www.bleepingcomputer.com/news/security/lumma-infostealer-malware-returns-after-law-enforcement-disruption/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/lumma-infostealer-malware-returns-after-law-enforcement-disruption/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.thenewoil.org/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
ESET Research<p><a href="https://infosec.exchange/tags/BREAKING" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BREAKING</span></a> <a href="https://infosec.exchange/tags/ESETresearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ESETresearch</span></a> can confirm the news of <a href="https://infosec.exchange/tags/Lumma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Lumma</span></a> Stealer's revival. ESET telemetry and botnet tracking show that operators are rebuilding their infrastructure, with their renewed activity reaching similar levels to those before the <a href="https://infosec.exchange/tags/disruption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>disruption</span></a> in May 2025.<br>Lumma Stealer operators are registering dozens of new domains weekly, resolving them primarily at nameservers located in RU. As seen with other threats in the past, this can complicate future attempts to disrupt its malicious operations.<br>In partnership with <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> and other allies, ESET is tracking Lumma Stealer activity and continues to partially disrupt its operations, specifically by targeting its <a href="https://infosec.exchange/tags/Steam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Steam</span></a> dead drop resolvers. <br>While ESET telemetry shows new Lumma Stealer builds weekly, their codebase hasn’t changed much since the takedown attempt. This suggests that the attackers had to focus on operational recovery instead of innovation. <br>C&amp;C data show reduced activity around the disruption (marked in turquoise) but the number of new samples detected per day has seen only minimal changes, highlighting the continual risk.<br>For more info on Lumma Stealer and the disruption, read our blogpost from a few weeks back <a href="https://www.welivesecurity.com/en/eset-research/eset-takes-part-global-operation-disrupt-lumma-stealer/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">welivesecurity.com/en/eset-res</span><span class="invisible">earch/eset-takes-part-global-operation-disrupt-lumma-stealer/</span></a></p>
Prof. Dr. Dennis-Kenji Kipker<p>Totgesagte leben länger: Nicht immer sind behördliche Maßnahmen gegen <a href="https://chaos.social/tags/Cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybercrime</span></a> nachhaltig - so beim Infostealer "<a href="https://chaos.social/tags/Lumma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Lumma</span></a>", der im letzten Jahr durch <a href="https://chaos.social/tags/Europol" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Europol</span></a> abgeschaltet wurde, indem 400.000 infizierte Rechner identifiziert und über Sinkholing aus dem Netz genommen wurden.</p><p>Mittlerweile aber soll der Informationsdiebstahl durch "Lumma" wieder in vollem Gange sein - technische Infrastruktur lässt sich eben doch recht zügig wieder aufbauen, wenn man will:</p><p><a href="https://www.heise.de/news/Comeback-von-Lumma-und-NoName057-16-Cybercrime-Zerschlagung-misslungen-10498191.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Comeback-von-Lum</span><span class="invisible">ma-und-NoName057-16-Cybercrime-Zerschlagung-misslungen-10498191.html</span></a> <a href="https://chaos.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
Pyrzout :vm:<p>Lumma Stealer Is Back &amp; Stealthier Than Ever – Source: www.darkreading.com <a href="https://ciso2ciso.com/lumma-stealer-is-back-stealthier-than-ever-source-www-darkreading-com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/lumma-stealer-is</span><span class="invisible">-back-stealthier-than-ever-source-www-darkreading-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/DarkReadingSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DarkReadingSecurity</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/DARKReading" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DARKReading</span></a> <a href="https://social.skynetcloud.site/tags/Lumma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Lumma</span></a></p>
Pyrzout :vm:<p>GitHub Abused to Spread Amadey, Lumma and Redline InfoStealers in Ukraine – Source:hackread.com <a href="https://ciso2ciso.com/github-abused-to-spread-amadey-lumma-and-redline-infostealers-in-ukraine-sourcehackread-com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/github-abused-to</span><span class="invisible">-spread-amadey-lumma-and-redline-infostealers-in-ukraine-sourcehackread-com/</span></a> <a href="https://social.skynetcloud.site/tags/1CyberSecurityNewsPost" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>1CyberSecurityNewsPost</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/CyberAttacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberAttacks</span></a> <a href="https://social.skynetcloud.site/tags/CyberAttack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberAttack</span></a> <a href="https://social.skynetcloud.site/tags/SmokeLoader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SmokeLoader</span></a> <a href="https://social.skynetcloud.site/tags/Emmenhtal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Emmenhtal</span></a> <a href="https://social.skynetcloud.site/tags/AsyncRAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AsyncRAT</span></a> <a href="https://social.skynetcloud.site/tags/Hackread" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hackread</span></a> <a href="https://social.skynetcloud.site/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://social.skynetcloud.site/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://social.skynetcloud.site/tags/Redline" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Redline</span></a> <a href="https://social.skynetcloud.site/tags/Ukraine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ukraine</span></a> <a href="https://social.skynetcloud.site/tags/Amadey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Amadey</span></a> <a href="https://social.skynetcloud.site/tags/GitHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GitHub</span></a> <a href="https://social.skynetcloud.site/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> <a href="https://social.skynetcloud.site/tags/Lumma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Lumma</span></a></p>
Pyrzout :vm:<p>GitHub Abused to Spread Amadey, Lumma and Redline InfoStealers in Ukraine <a href="https://hackread.com/github-abused-amadey-lumma-redline-infostealers-ukraine/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/github-abused-ama</span><span class="invisible">dey-lumma-redline-infostealers-ukraine/</span></a> <a href="https://social.skynetcloud.site/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/CyberAttacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberAttacks</span></a> <a href="https://social.skynetcloud.site/tags/CyberAttack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberAttack</span></a> <a href="https://social.skynetcloud.site/tags/SmokeLoader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SmokeLoader</span></a> <a href="https://social.skynetcloud.site/tags/Emmenhtal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Emmenhtal</span></a> <a href="https://social.skynetcloud.site/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.skynetcloud.site/tags/AsyncRAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AsyncRAT</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.skynetcloud.site/tags/Redline" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Redline</span></a> <a href="https://social.skynetcloud.site/tags/Ukraine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ukraine</span></a> <a href="https://social.skynetcloud.site/tags/Amadey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Amadey</span></a> <a href="https://social.skynetcloud.site/tags/GitHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GitHub</span></a> <a href="https://social.skynetcloud.site/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> <a href="https://social.skynetcloud.site/tags/Lumma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Lumma</span></a></p>

Researchers from #CheckPoint confirmed that despite last week’s FBI announcement that it helped to take down the crew behind the #Lumma infostealer, the malware continues to operate. The group's command and control servers remain operational.

🔗 theregister.com/2025/06/02/sec

The Register · Lumma infostealer takedown may have inflicted only a flesh wound as crew keeps pinching and selling dataBy Brandon Vigliarolo