Lumma Stealer Malware Being Spread to Windows Devices via Fake Human Verification Pages, CloudSEK Says

These fake human verification pages instruct users to run hidden commands to enable the downloading of the malware.

Advertisement
Written by Akash Dutta, Edited by Siddharth Suvarna | Updated: 19 September 2024 17:13 IST
Highlights
  • Content Delivery Networks (CDNs) are being used to trick users
  • Lumma Stealer is an information-stealing malware
  • Researchers have found many phishing websites distributing the malware

So far Lumma Stealer is the only malware known to be using this method

Photo Credit: Pexels/Sora Shimazaki

Lumma Stealer, a recently identified information-stealing malware, is being distributed to users via fake human verification pages. According to researchers at the cybersecurity firm CloudSEK, the malware is targeting Windows devices and is designed to steal sensitive information from the infected device. Concerningly, researchers have discovered multiple phishing websites which are deploying these fake verification pages to trick users into downloading the malware. CloudSEK researchers have warned organisations to implement endpoint protection solutions and to train employees and users about this new social engineering tactic.

Lumma Stealer Malware Being Distributed Using New Phishing Technique

According to the CloudSEK report, multiple active websites were found to be spreading the Lumma Stealer malware. The technique was first discovered by Unit42 at Palo Alto Networks, a cybersecurity firm, but the scope of the distribution chain is now believed to be much larger than previously assumed.

The attackers have set up various malicious websites and have added a fake human verification system, resembling the Google Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) page. However, unlike the regular CAPTCHA page where users have to check a few boxes or perform similar pattern-based tasks to prove they are not a bot, the fake pages instruct the user to run some unusual commands.

Advertisement

In one instance, the researchers spotted a fake verification page asking users to execute a PowerShell script. PowerShell scripts contain a series of commands that can be executed in the Run dialog box. In this case, the commands were found to fetch the content from the a.txt file hosted on a remote server. This prompted a file to be downloaded and extracted on the Windows system, infecting it with Lumma Stealer.

The report also listed the malicious URLs which were spotted distributing the malware to unsuspecting users. However, this is not the full list and there might be more such websites carrying out the attack.

  • hxxps[://]heroic-genie-2b372e[.]netlify[.]app/please-verify-z[.]html
  • hxxps[://]fipydslaongos[.]b-cdn[.]net/please-verify-z[.]html
  • hxxps[://]sdkjhfdskjnck[.]s3[.]amazonaws[.]com/human-verify-system[.]html
  • hxxps[://]verifyhuman476[.]b-cdn[.]net/human-verify-system[.]html
  • hxxps[://]pub-9c4ec7f3f95c448b85e464d2b533aac1[.]r2[.]dev/human-verify-system[.]html
  • hxxps[://]verifyhuman476[.]b-cdn[.]net/human-verify-system[.]html
  • hxxps[://]newvideozones[.]click/veri[.]html
  • hxxps[://]ch3[.]dlvideosfre[.]click/human-verify-system[.]html
  • hxxps[://]newvideozones[.]click/veri[.]html
  • hxxps[://]ofsetvideofre[.]click

The researchers also observed that content delivery networks (CDNs) were being used to spread these fake verification pages. Further, the attackers were spotted using base64 encoding and clipboard manipulation to evade demonstration. It is also possible to distribute other malware using the same technique, although such instances have not been seen so far.

Advertisement

Since the modus operandi of the attack is based on phishing techniques, no security patch can prevent devices from getting infected. However, there are some steps users and organisations can take to safeguard against the Lumma stealer malware.

As per the report, users and employees should be made aware of this phishing tactic to help them not fall for it. Additionally, organisations should implement and maintain reliable endpoint protection solutions to detect and block PowerShell-based attacks. Further, regularly updating and patching systems to reduce the vulnerabilities that Lumma Stealer malware can exploit should also help.

 

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Advertisement
Popular Mobile Brands
  1. OTT Releases of the Week (Oct 13th - Oct 19th): What to Stream This Weekend?
  2. Tiger Shroff's Baaghi 4 to Land on OTT Platforms Soon: All the Details
  3. Motorola G67 Power 5G Visits Geekbench With This Snapdragon Chipset
  4. Oppo Pad 5 With MediaTek Dimensity 9400+ Chipset Launched
  5. OnePlus 15 Confirmed to Debut in These Three Colourways
  6. Red Magic 11 Pro Series With Liquid Cooling Launched at This Price
  7. Oppo Watch S With Temperature Monitoring Launched at This Price
  8. Oppo Find X9 Series India Launch, Colourways Confirmed After China Debut
  9. Amazon Diwali Sale 2025: Best Deals on Smartwatches for Runners
  10. Oppo Find X9 Pro, Find X9 Launched With Dimensity 9500 SoC: See Price
  1. The Fantastic Four: First Steps Reportedly Set for OTT Debut Soon: All You Need to Know
  2. Huawei Nova 14 Vitality Edition Launched With 5,500mAh Battery, 50-Megapixel Selfie Camera: Price, Specifications
  3. Anthropic Connects Claude With Microsoft 365 Platforms, Can Pull Information From Outlook and Teams
  4. Red Magic 11 Pro Series Launched With Snapdragon Elite Gen 5, Liquid Cooling: Price, Specifications
  5. Nintendo Aims to Make 25 Million Switch 2 Units by March 2026 to Set Gaming History
  6. iQOO 15 Spotted on NBTC Certification Website as Global Launch Nears
  7. OnePlus Pad 2 With Dimensity 9400+ SoC, 3K Display Set to Launch in China Alongside OnePlus 15
  8. CERT-In Highlights Zoom Security Flaws That Could Let Hackers Access Meeting, Sensitive Information
  9. OpenAI Is Now Letting Users Generate Sora 2 Videos on the Web, Increases Duration
  10. Redmi K90 Pro Max Design Revealed; Will Feature Denim-Textured Rear Panel, Bose-Tuned Speakers
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.