Alias Description | Votes |
---|---|
Lumma is a possible alias for Lumma Stealer. Lumma is a sophisticated and stealthy malware, known for its extensive ability to harvest sensitive data from infected devices. It is primarily designed to steal passwords, card details, cryptocurrency wallets, and browser session cookies. The malware has evolved with new anti-sandbox methods, makin | 11 |
Alias Description | Association Type | Votes |
---|---|---|
The Redline Malware is associated with Lumma Stealer. RedLine is a type of malware, a malicious software designed to exploit and damage computer systems. It can infiltrate systems through suspicious downloads, emails, or websites, often unbeknownst to the user. Once inside, RedLine can steal personal information, disrupt operations, or deliver further | Unspecified | 4 |
The Redline Stealer Malware is associated with Lumma Stealer. RedLine Stealer is a type of malware, or malicious software, that infiltrates computer systems with the intent to exploit and cause damage. It typically gains access through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside the system, it can steal personal i | Unspecified | 3 |
The Magecart Malware is associated with Lumma Stealer. Magecart is a form of malware that targets e-commerce platforms by injecting malicious code to steal customer data. The malware can infect systems through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it can disrupt operations and steal personal informat | Unspecified | 2 |
The Vidar Malware is associated with Lumma Stealer. Vidar is a malicious software (malware) that operates as an infostealer, primarily targeting Windows-based systems. It's written in C++ and is based on the Arkei stealer. Vidar is part of a broader landscape of malware threats such as Emotet, IcedID, CobaltStrike, SVCReady, CargoBay, Pushdo, Minodo, | Unspecified | 2 |
The Rhadamanthys Malware is associated with Lumma Stealer. Rhadamanthys is a sophisticated malware that has been used by the threat actor TA547 to target German organizations. This malicious software, designed to exploit and damage computer systems, infiltrates devices through suspicious downloads, emails, or websites, often unbeknownst to the user. Once em | Unspecified | 2 |
The Mozi Malware is associated with Lumma Stealer. Mozi is a type of malware, a malicious software designed to exploit and damage computer systems and devices. It typically infiltrates systems through suspicious downloads, emails, or websites, often unbeknownst to the user. Once inside, it can steal personal information, disrupt operations, or even | Unspecified | 2 |
The Netsupport Malware is associated with Lumma Stealer. NetSupport is a legitimate remote access software that has been exploited as a malware tool by various threat actors. It's often used in combination with other malicious software like BlackBasta Ransomware, IcedID, and occasionally Lumma Stealer, the most common infostealer in the world today. The m | Unspecified | 2 |
The Netsupport Rat Malware is associated with Lumma Stealer. NetSupport RAT is a malicious software (malware) that poses a significant threat to organizational safety. The malware, which can be spread through suspicious downloads, emails, or websites, infiltrates systems without detection and has the potential to steal personal information, disrupt operations | Unspecified | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The FIN7 Threat Actor is associated with Lumma Stealer. FIN7, also known as Carbanak, Carbon Spider, Cobalt Group, and Navigator Group, is a notorious cybercrime group that has been active since 2012. The group is recognized for its advanced combination of malware and social engineering tactics, having executed numerous successful attacks against global | Unspecified | 2 |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
DARKReading | 14 days ago | ||
BankInfoSecurity | 14 days ago | ||
InfoSecurity-magazine | 15 days ago | ||
InfoSecurity-magazine | 22 days ago | ||
Krebs on Security | a month ago | ||
InfoSecurity-magazine | a month ago | ||
CrowdStrike | 2 months ago | ||
DARKReading | 3 months ago | ||
DARKReading | 3 months ago | ||
DARKReading | 3 months ago | ||
DARKReading | 3 months ago | ||
ESET | 3 months ago | ||
Trend Micro | 3 months ago | ||
CrowdStrike | 3 months ago | ||
CrowdStrike | 3 months ago | ||
Checkpoint | 3 months ago | ||
Unit42 | 3 months ago | ||
ESET | 3 months ago | ||
ESET | 4 months ago | ||
DARKReading | 4 months ago |