Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Badges, Bytes and Blackmail

February 7, 2026

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Lumma Stealer Developers Doxxed – Infosecurity Magazine
News

Lumma Stealer Developers Doxxed – Infosecurity Magazine

Team-CWDBy Team-CWDOctober 22, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Lumma Stealer operations have been unravelling and a recent doxxing campaign targeted individuals allegedly affiliated with malware development and administration. 

Sensitive details of these core members have been leaked following the doxxing campaign. The attack is suspected to have been carried out by cybercrime competitors, according to a Trend Micro report.

Lumma Stealer is one of the most notorious infostealers and first appeared in the wild in 2022. Its position at the top “made it a prime target” for takedown operations and underground exposure campaigns, noted the Trend Micro’s analysis.

In September, the security firm noted a decline in new command and control (C2) infrastructure activity associated with Lumma Stealer and reduction in the number of endpoints targeted.

Trend Micro said this aligns with a targeted underground exposure campaign that has put the spotlight on five individuals allegedly linked to the Lumma Stealer operation.

The role of those identified included individuals responsible for operational oversight as well as more technical roles associated with crypter development for malware obfuscation. Their information was shared on a website called Lumma Rats.

The information shared included passport numbers, bank account information, email addresses and links to various online profiles. 

“The exposure campaign was accompanied by threats, accusations of betrayal within the cybercriminal community, and claims that the Lumma Stealer team had prioritized profit over the operational security of their clients. The campaign’s consistency and depth suggest insider knowledge or access to compromised accounts and databases,” the Trend Micro analysis said.

It is noted that this information has not been independently verified.

The doxxing took place between last August and October 2025.

Lumma Stealer distribution has been fueled by the use of Telegram, as part of the supposed doxing there a representative of the group posted on an underground forum that their Telegram accounts had been stolen.

The Telegram accounts were reportedly compromised on  September 17, further disrupting their ability to communicate with customers and coordinate operations.

While Lumma Stealer faces significant disruption, its users are now discussing alternative information stealer solutions on forums and Telegram channels. 

Trend Micro noted Vidar and StealC have emerged as the primary replacement options, with many users reporting migrations to these platforms due to Lumma Stealer’s instability and loss of support.

Shifts in pay-per-install (PPI) services such as Amadey have also emerged. PPIs have been widely used to deliver infostealer payloads and with the recent Lumma drop in activity, Amadey has also experienced reduced demand.

In May 2024, Microsoft and law enforcement partners disrupted the infrastructure behind Lumma Stealer by blocking over 2000 domains. The operation also identified 394,000 infested Windows computers and seized the Lumma control panel.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleWhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More
Next Article Researchers Expose TA585’s MonsterV2 Malware Capabilities and Attack Chain
Team-CWD
  • Website

Related Posts

News

Badges, Bytes and Blackmail

February 7, 2026
News

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Here’s what you should know

February 6, 2026

Children and chatbots: What parents should know

January 23, 2026

Your information is on the dark web. What happens next?

January 13, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.