James Ding
May 22, 2025 09:04
Microsoft is leading the Global Union to interfere with Lumma Stealer, a prominent malware tool used for cyber crime. Legal measures and domain attacks are an important stage of cyber security efforts.
As a joint effort to fight Cybercrime, Microsoft has been working with international partners to take crucial measures against Lumma Stealer, an infamous malicious code tool used by Cybercriminals. According to Microsoft, DCU (DIGITAL CRIMES Unit) took legal measures to interfere with Lumma Stealer, which helped data theft and cyber crime on May 13, 2025.
To seize malicious domains
Microsoft’s DCU, which ordered a court order in the US District Court in northern Georgia, successfully seized and blocked about 2,300 domains linked to Lumma’s operation. The Ministry of Justice (DOJ) supported this effort by dismantling the central command structure of Lumma, and the EUROPOL and JAPAN ‘S Cybercrime Control Center (JC3) played an important role in stopping local infrastructure.
Influence
Over 394,000 Windows computers were found to be infected with Lumma malware between March and May 2025. Microsoft’s adjusted measures with legal execution and industrial partners have cut off the communication between malware and victims, and redirect the theme with the Microsoft Sink Hall to collect intelligence and improve security measures.
Understanding Lumma Stealer
Lumma Stealer, MAAS (Malware-AS-A-SERVICE), has been sold in an underground forum since 2022. It is famous for stealing sensitive information, including password and cryptocurrency wallet. Malware is distributed through spear phishing e -mail and malicious malvertising and often pretends to be reliable brands such as Microsoft.
Global cyber security collaboration
This work emphasizes the importance of global collaboration in cyber security. Microsoft has worked with companies such as ESET, Bitsight, Lumen, Cloudflare, Cleans and GMO Registry, contributing to the rapid takdown of Lumma’s infrastructure.
The operation of Lumma Stealer emphasizes the continuous need for the boundaries and innovation of cyber security practices. Microsoft and partners continue to explore new ways to respond to cyber threats, ensuring the protection of important infrastructure and online users worldwide.
Image Source: Shutter Stock