Lumma Stealer Uses Browser Fingerprinting to Collect Data and for Stealthy C&C Server Communications

Lumma Stealer Uses Browser Fingerprinting to Collect Data and for Stealthy C&C Server Communications

Lumma Stealer has emerged as a serious threat in the cybercrime world, targeting users through fake software updates and cracked applications.

This information-stealing malware targets the collection on login details, payment card information, and cryptocurrency wallet data from infected systems.

The malware spreads primarily through phishing emails, malicious advertisements, and compromised websites that trick users into downloading what appears to be legitimate software.

What makes Lumma Stealer particularly dangerous is its ability to steal data from multiple web browsers, including Chrome, Firefox, Edge, and Brave.

The malware targets saved passwords, autofill information, browsing history, and cookies that contain session tokens.

Once it gains access to a system, it quickly scans for cryptocurrency wallet extensions and email clients to maximize the value of stolen information.

google

Trend Micro security researchers identified that the malware uses browser fingerprinting to collect detailed device information and establish covert communication channels with its command-and-control servers.

The collected data is packaged and sent to remote servers controlled by attackers, who then sell this information on dark web markets or use it directly for financial fraud.

Victims often remain unaware of the infection until they notice unauthorized transactions or account compromises.

The malware operates silently in the background, making detection challenging for average users who lack advanced security tools.

New Lumma Stealer browser fingerprinting behavior (Source - Trend Micro)
New Lumma Stealer browser fingerprinting behavior (Source – Trend Micro)

Organizations and individuals face significant risks from Lumma Stealer infections, including identity theft, financial losses, and compromised business accounts.

The malware continues to evolve with new variants appearing regularly, making it a persistent threat in the current security environment.

Browser Fingerprinting Technique

Lumma Stealer employs browser fingerprinting as both a data collection method and a communication security measure.

The malware gathers specific browser attributes such as screen resolution, installed fonts, time zone settings, and language preferences to create a unique device profile.

This fingerprint helps attackers track infected machines and ensures that communication with command-and-control servers appears as regular web traffic.

The fingerprinting process also allows Lumma Stealer to identify the most valuable targets by analyzing installed browser extensions and stored credentials.

The malware checks for security software and virtual machine indicators to avoid detection in analysis environments, increasing its survival rate on real user systems.

Follow us on Google News, LinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

googlenews



Source link