Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Google says it will sign the EU AI practice code

Chinese companies linked to Silk Typhoons have filed more than 15 patents for Cyberspy Tool

Look inside Pillar’s AI security platform

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Sticky werewolves deploy Lumma Stealer in Russia and Belarus using undocumented implants
Identity

Sticky werewolves deploy Lumma Stealer in Russia and Belarus using undocumented implants

userBy userFebruary 28, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 28, 2025Ravi LakshmananFinancial fraud / Cyberspy

The threat actor known as Sticky Wearwolf is primarily linked to targeted attacks in Russia and Belarus, and is intended to deliver Lumma Stealer malware using previously undocumented implants.

Cybersecurity company Kaspersky tracks activities under the name Angry Likho. This is said to be a “strong similarity” that awakened to Likho (aka Core Werewolf, Gamacopy, and Pseudogamaderon).

“However, the angry Rikho attacks tend to focus on more compact infrastructure, limited range of implants, and employees of large organizations, including government agencies and their contractors,” the Russian company said.

Cybersecurity

Given the use of fluent Russian in the bait files used to cause infection chains, it is suspected that the threat actor is likely to be native Russian speakers. Last month, cybersecurity company F6 (formerly Cont) described it as “Procrane’s Cyberspie Group.”

The attackers are known to be primarily a single organisation in Russia and Belarus, with hundreds of casualties identified in the former.

Previous intrusion activities associated with the group utilize phishing email as a conduit for distributing various malware families, including Netwire, Rhadamanthys, Ozone Rat, and backdoors known as DarkTrack.

Attack sequences involve the use of spear phishing emails with attachments (such as archive files) trapped in a booby. Among them are two Windows Shortcuts (LNK) files and a legitimate lure document.

The archive file takes malicious activity to the next stage, unlocking complex multi-stage processes, and deploying Lumma Information Stealer.

“The implant was created to serve as a legal open source installer, a Nullsoft Scriptable installation system, and a self-extracting archive (SFX),” says Kaspersky.

It has been observed that the attack incorporates steps to avoid detection by security vendors using emulators and sandbox environment checks, ending or restarting the malware after a 10,000 ms delay.

This overlap makes it more likely that the attackers behind two campaigns share the same technology or the same group.

Cybersecurity

Lumma Stealer is designed to collect system information and installed software information from compromised devices as well as sensitive data such as cookies, usernames, passwords, bank card numbers, and connection logs. You can also steal data from a variety of web browsers, cryptocurrency wallets, Cryptowallet browser extension (metamask), authenticators, and Anydesk and Keepass.

“The group’s latest attacks use Lumma Stealer, which collects a huge amount of data from infected devices, including bank details stored by browsers and Cryptowallet files,” says Kaspersky.

“The group relies on easily available malicious utilities obtained from the DarkNet forum, rather than developing their own tools. The only thing they do is create a mechanism for malware delivery to victims’ devices and create targeted phishing emails.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe Biore Frog Project enters the hot phase
Next Article Solar Quality Summit Europe 2025: Guaranteed future growth
user
  • Website

Related Posts

Chinese companies linked to Silk Typhoons have filed more than 15 patents for Cyberspy Tool

July 30, 2025

Look inside Pillar’s AI security platform

July 30, 2025

Google launches DBSC Open Beta in Chrome and increases patch transparency via Project Zero

July 30, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Google says it will sign the EU AI practice code

Chinese companies linked to Silk Typhoons have filed more than 15 patents for Cyberspy Tool

Look inside Pillar’s AI security platform

How AI Supercharges Transformational Change for ALS Imagination

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

New Internet Era: Berners-Lee Sets the Pace as Zuckerberg Pursues Metaverse

TwinH Transforms Belgian Student Life: Hendrik’s Journey to Secure Digital Identity

Tim Berners-Lee Unveils the “Missing Link”: How the Web’s Architect Is Building AI’s Trusted Future

Dispatch from London Tech Week: Keir Starmer, The Digital Twin Boom, and FySelf’s Game-Changing TwinH

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.