Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

New Rowhammer Attack Variant Degrades AI Models on Nvidia GPUs

Over 600 laravel apps exposed to remote code execution due to app_keys leaked on github

Sequoia bets on silence | TechCrunch

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Sticky werewolves deploy Lumma Stealer in Russia and Belarus using undocumented implants
Identity

Sticky werewolves deploy Lumma Stealer in Russia and Belarus using undocumented implants

userBy userFebruary 28, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 28, 2025Ravi LakshmananFinancial fraud / Cyberspy

The threat actor known as Sticky Wearwolf is primarily linked to targeted attacks in Russia and Belarus, and is intended to deliver Lumma Stealer malware using previously undocumented implants.

Cybersecurity company Kaspersky tracks activities under the name Angry Likho. This is said to be a “strong similarity” that awakened to Likho (aka Core Werewolf, Gamacopy, and Pseudogamaderon).

“However, the angry Rikho attacks tend to focus on more compact infrastructure, limited range of implants, and employees of large organizations, including government agencies and their contractors,” the Russian company said.

Cybersecurity

Given the use of fluent Russian in the bait files used to cause infection chains, it is suspected that the threat actor is likely to be native Russian speakers. Last month, cybersecurity company F6 (formerly Cont) described it as “Procrane’s Cyberspie Group.”

The attackers are known to be primarily a single organisation in Russia and Belarus, with hundreds of casualties identified in the former.

Previous intrusion activities associated with the group utilize phishing email as a conduit for distributing various malware families, including Netwire, Rhadamanthys, Ozone Rat, and backdoors known as DarkTrack.

Attack sequences involve the use of spear phishing emails with attachments (such as archive files) trapped in a booby. Among them are two Windows Shortcuts (LNK) files and a legitimate lure document.

The archive file takes malicious activity to the next stage, unlocking complex multi-stage processes, and deploying Lumma Information Stealer.

“The implant was created to serve as a legal open source installer, a Nullsoft Scriptable installation system, and a self-extracting archive (SFX),” says Kaspersky.

It has been observed that the attack incorporates steps to avoid detection by security vendors using emulators and sandbox environment checks, ending or restarting the malware after a 10,000 ms delay.

This overlap makes it more likely that the attackers behind two campaigns share the same technology or the same group.

Cybersecurity

Lumma Stealer is designed to collect system information and installed software information from compromised devices as well as sensitive data such as cookies, usernames, passwords, bank card numbers, and connection logs. You can also steal data from a variety of web browsers, cryptocurrency wallets, Cryptowallet browser extension (metamask), authenticators, and Anydesk and Keepass.

“The group’s latest attacks use Lumma Stealer, which collects a huge amount of data from infected devices, including bank details stored by browsers and Cryptowallet files,” says Kaspersky.

“The group relies on easily available malicious utilities obtained from the DarkNet forum, rather than developing their own tools. The only thing they do is create a mechanism for malware delivery to victims’ devices and create targeted phishing emails.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe Biore Frog Project enters the hot phase
Next Article Solar Quality Summit Europe 2025: Guaranteed future growth
user
  • Website

Related Posts

New Rowhammer Attack Variant Degrades AI Models on Nvidia GPUs

July 12, 2025

Over 600 laravel apps exposed to remote code execution due to app_keys leaked on github

July 12, 2025

Fortinet releases patches for important SQL injection defects in Fortiweb (CVE-2025-25257)

July 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

New Rowhammer Attack Variant Degrades AI Models on Nvidia GPUs

Over 600 laravel apps exposed to remote code execution due to app_keys leaked on github

Sequoia bets on silence | TechCrunch

Windsurf CEO goes to Google. Openai’s acquisition is falling apart

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.