From Games to looting: Lumma Stealer malware spreads in Discord

Carding 4 Carders

Professional
Messages
2,731
Reputation
13
Reaction score
1,367
Points
113
Now users pay for installing games with their personal identity.

According to a new report from Trend Micro, attackers have started using the Discord Content Delivery Network (CDN) to distribute the Lumma Stealer malware. Moreover, hackers create bots using the app's API that can control malware from a distance.

Lumma Stealer was first discovered in 2018. An infostealer written in the C programming language can steal credentials and other confidential information from an infected computer. Currently, Lumma Stealer is offered for rent to other hackers using the MAAS (Malware-as-a-Service) model for just $250 per month. By purchasing the most expensive tariff, cybercriminals gain access to the source code of the program and can modify it to improve their attacks.

During the campaign, cybercriminals from fake or compromised accounts contact victims via private messages. In the messages, hackers offer to participate in a project in which you need to review the game. There is a $10 reward for participation via PayPal or a Discord Nitro Boost bonus. When the victim agrees, the hacker sends her a link to download the file, which starts downloading Lumma Stealer.

After activation, the virus tries to steal funds from cryptocurrency wallets, as well as usernames and passwords stored in the browser. After receiving the data, an attacker can take over the victim's accounts or even fake the user's identity to commit further cybercrime.

To protect against such attacks, Trend Micro recommends that all Discord users exercise caution when interacting with unknown senders and avoid opening links or downloading attachments in messages. It will also be useful to use reliable antivirus software to protect your computer from cyber threats.
 
Top