| Alias Description | Votes |
|---|---|
| Lumma Stealer is a possible alias for Lumma. Lumma Stealer is a potent malware designed to exfiltrate information from compromised systems, including system details, web browsers, and browser extensions. The malware was primarily delivered to victims through websites hosting cracked games, specifically targeting gamers. In July 2024, it was di | 15 |
| Stealc is a possible alias for Lumma. StealC is a form of malware that specifically targets browser extensions and password managers. Its emergence was first reported in early 2023 and it quickly grew in popularity on the dark web due to its ability to bypass traditional security measures. The malware's modus operandi involves stealing | 7 |
| Rhadamanthys is a possible alias for Lumma. Rhadamanthys is a sophisticated and notorious malware, known for its ability to steal sensitive information. It has been utilized by various threat actors, including nation-state entities such as Iran's Void Manticore and the pro-Palestine group "Handala." Its deployment often involves phishing tact | 4 |
| Lumma Infostealer is a possible alias for Lumma. | 4 |
| Alias Description | Association Type | Votes |
|---|---|---|
| The Redline Malware is associated with Lumma. RedLine is a type of malware, or malicious software, designed to exploit and damage computer systems. It infects systems through suspicious downloads, emails, or websites, often unbeknownst to the user. Once inside, it can steal personal information, disrupt operations, or even hold data hostage for | Unspecified | 9 |
| The Lummac2 Malware is associated with Lumma. LummaC2 is a malicious software (malware) that was initially identified in Russian-speaking forums in 2022. The malware, written in C and distributed as Malware-as-a-Service (MaaS), has been actively developed over time, with researchers noting that LummaC2 4.0 operates as a dynamic malware strain. | Unspecified | 6 |
| The Amadey Malware is associated with Lumma. Amadey is a malicious software (malware) that has been known since 2018 and is notorious for stealing credentials from popular browsers and various Virtual Network Computing (VNC) systems. The malware, which is often sold in underground forums, uses sophisticated techniques to infect systems, includ | Unspecified | 5 |
| The Clickfix Malware is associated with Lumma. ClickFix is a malicious software (malware) that has been actively exploiting computers and devices, primarily through fake WordPress plug-ins. The malware campaign leverages these bogus plug-ins to inject JavaScript that leads to ClickFix fake browser updates. These updates use blockchain and smart | Unspecified | 3 |
| The Autoit Malware is associated with Lumma. AutoIt is a type of malware, a malicious software designed to exploit and damage computers or devices. It infects systems through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, AutoIt can steal personal information, disrupt operations, or even hold data h | Unspecified | 2 |
| The Amos Malware is associated with Lumma. AMOS is a malicious software (malware) specifically designed to target macOS systems. First identified in early 2023, it has been associated with campaigns such as the ClearFake campaign, which spread the AMOS information stealer across macOS devices. This malware is particularly dangerous due to it | Unspecified | 2 |
| The Redline Stealer Malware is associated with Lumma. The RedLine Stealer is a formidable malware that specializes in stealthily stealing credentials and sensitive information. First documented in 2020, it has since evolved to use the Windows Communication Foundation (WCF) framework and later a REST API for network communication. This malware infects s | Unspecified | 2 |
| The malware Meta Stealer is associated with Lumma. | Unspecified | 2 |
| The Latrodectus Malware is associated with Lumma. Latrodectus, a harmful malware discovered in late 2023, has been gaining momentum among threat actors, with a significant increase in activity noted throughout February and March. This malicious software is being employed by initial access brokers (IABs) in email threat campaigns and uses MSI files | Unspecified | 2 |
| Alias Description | Association Type | Votes |
|---|---|---|
| The BianLian Threat Actor is associated with Lumma. BianLian is a threat actor that has been active in cybercrime, leveraging various techniques for malicious intent. Prior to January 2024, the group used an encryptor (encryptor.exe) that modified all encrypted files to have the .bianlian extension and created a ransom note in each affected directory | Unspecified | 2 |
| Preview | Source Link | CreatedAt | Title |
|---|---|---|---|
| Recorded Future | 12 days ago | ||
| Unit42 | 20 days ago | ||
| Checkpoint | a month ago | ||
| InfoSecurity-magazine | a month ago | ||
| Recorded Future | a month ago | ||
| Flashpoint | a month ago | ||
| InfoSecurity-magazine | a month ago | ||
| Trend Micro | a month ago | ||
| Securelist | a month ago | ||
| Checkpoint | 2 months ago | ||
| Flashpoint | 2 months ago | ||
| Recorded Future | 2 months ago | ||
| Malware-traffic-analysis.net | 2 months ago | ||
| Recorded Future | 3 months ago | ||
| Unit42 | 4 months ago | ||
| CISA | 4 months ago | ||
| Trend Micro | 4 months ago | ||
| InfoSecurity-magazine | 4 months ago | ||
| Unit42 | 4 months ago | ||
| InfoSecurity-magazine | 4 months ago |