Techno

Microsoft dismantles dangerous Lumma infostealer malware targeting personal data

Infostealer Malware programs were recently rising, and this is evident from The billions of user records were leaked online last year alone. This type of malware targets everything from your name, phone number and address to financial details and cryptocurrencies. The charge of the charge is Lumma Infostealer.

These harmful programs have been reported since last year, and the security researchers described it as one of the most dangerous, which affected millions. There were endless incidents from Lumma that targeted people’s personal data (more about this later), but good news is that Microsoft has dropped it.

The Redmond -based company has announced that it had dismantled the process of harmful programs for what was thieved with the help of law enforcement agencies all over the world.

Join the free CyberGuy report: Get expert advice experts, critical safety alerts, and exclusive deals – in addition to immediate access to my country Ultimate survival guide When registering!

Clarification of a drunk at work (Cyberguy “Knutsson)

What you need to know

Microsoft confirmed that she had succeeded in reducing the Lumma Stealer network in cooperation with law enforcement agencies worldwide. in Blog postThe company revealed that the digital crime unit may follow infections on more than 394,000 Windows devices worldwide between March 16 and May 16.

Lumma was a tool to move to Internet criminals, and it is often used in sensitive information such as login reliability, credit card numbers, bank account details and cryptocurrency portfolio data. Make the arrival of harmful programs and their impact a preferred option between the actors of threats for financial theft and data violations.

Violation of the huge data displays 184 million passwords and login recordings

To disrupt the malware process, Microsoft has obtained an order from the court from the American Provincial Court of the Northern Region in Georgia, which allowed the company to land the main areas that supported the Lumma infrastructure. This was followed by the US Department of Justice to control the basic driving system in Lumma and the closure of the markets, where harmful programs were sold.

International cooperation also played a major role. Japan The electronic crime unit Help domesticate the local -hosted infrastructure for Lumma, while Europol helped measures against hundreds of areas used in the process. In total, more than 1,300 fields have been seized or redirect to the Microsoft Escars -run hole to prevent more damage.

Microsoft says this removal effort also included support from industrial partners such as Cloudflare, Bitsight and LUMEN, which helped dismantle the broader ecosystem that enabled Lumma to prosper.

Laptop

HP laptop (Cyberguy “Knutsson)

New malware takes advantage of fake updates to steal data

More about Lumma Infostealer

Lumma is harmful programs as a service (Maas) that has been marketed and sold through underground forums since 2022. Over the years, its developers released multiple versions to constantly improve their capabilities. I was first informed of Lumma in February 2024, when it was so It is used by infiltrators to reach Google accounts Using expired cookies that contain login information.

Lumin Users continue to target usersWith reports in October 2024 it was revealed that it was The character of fake human verification pages impossible To deceive Windows users to share sensitive information. Mescape programs were not limited to Windows. In January 2024, security researchers found that malfostealer programs were Targeting 100 million Mac usersStealing browser accreditation data, cryptocurrencies and other personal data.

Someone writes on the laptop

Windows laptop (Cyberguy “Knutsson)

How to remove harmful programs on a computer (2025)

6 ways you can protect yourself from Infostealer

To protect yourself from the advanced threat of Infostealer Malware programs, which continue to target users through advanced social engineering tactics, consider taking these six basic security measures:

1. Be skeptical of CAPTCHA claims: Captcha tests do not require pressure on Windows + R, copy orders, or paste anything into PowerShell. If the website guides you to do so, this is likely to be a fraud. Close the page immediately and avoid interacting with it.

2. Do not click on links from unspecified emails and use strong anti -virus programs: Several Infostealer attacks begin with deceptive email messages that have reliable services. Always check the sender before clicking on the links. If it seems an urgent or unexpected email, go directly to the company’s official website instead of clicking on any links inside the email.

The best way to protect yourself from malicious links that prove harmful programs, which may reach your own information, is to install a strong antivirus program on all your devices. This protection can also be alerted to relieving emails and fraud on Ransomwari, and maintaining your personal information and digital assets. Get my choices for the best winners to protect antivirus 2025 for Windows, Mac, Android and iOS devices.

3. Enabling dual -factors authentication: maybe Dual factors authentication (2FA) The more possible. This adds an additional layer of safety by requesting another form of verification, such as a code that is sent to your phone, as well as your password.

4. Keep updated devices: regularly Update the operating system, browser and safety program It ensures that you have the latest stains against known gaps. Cybercrimins takes advantage of outdated systems, so automatic updates enable a simple but effective way to stay protected.

What is artificial intelligence (AI)?

5. Monitor your accounts of suspicious activity and change your passwords: If you have interacted with a suspicious website, or an e -mail to shoot or a fake login page, check your online accounts for any unusual activity. Find unexpected login attempts, unauthorized password, or financial transactions that you do not recognize. If anything looks, change the passwords immediately and inform the activity to the relevant service provider. Also, consider using a Password Director To create and store complex passwords. Get more details about my country The best password managers reviewed by experts in 2025 here.

6. Invest in the personal data removal service: Think about using a service that monitors your personal information and alerts you to possible violations or unauthorized use of your data. These services can provide early warning marks to steal identity or other harmful activities of Infostealer or similar attacks. Although there is no service to remove all of your data from the Internet, get a great order removal service if you want to monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check the best data removal choices here.

Get on Free examination To see if your personal information has already came out on the web.

Magistical programs steal bank cards and passwords from millions of devices

Court Kisa Curt

Remove Microsoft from Lumma theft The malware network is a great victory in the Infostealers control, which has fueled an increase in data violations during the past year. Lumma has become an electronic mobility tool, as it targets everything from the browser accreditation data to the encryption portfolio via Windows and Mac systems. I have been following these harmful programs since early 2024, and its ability to impersonate the personality verification personality and abuse of cookies that have ended in particular.

Click here to get the Fox News app

Do you feel that technology companies do enough to protect users from harmful programs like this? Let’s know through our writing in Cyberguy.com/contact

For more technical advice and security alerts, participated in the free newsletter of Cyberguy Report by going to Cyberguy.com/newsledter

Ask Kurt a question or tell us about the stories you want to cover

Follow Court on his social channels

Answers to the most asked Cyberguy questions:

New from Court:

Copyright 2025 Cyberguy.com. All rights reserved.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button