
the staff of the Ridgewood blog
Redmond Wa, in a major win against global cybercrime, Microsoft announced that it has dismantled the Lumma Stealer malware infrastructure, with support from international law enforcement and key tech industry partners. The malware infected over 394,000 Windows computers across the globe between March 16 and May 16, according to Microsoft’s Digital Crimes Unit (DCU).
What Is Lumma Stealer Malware?
Lumma Stealer is a sophisticated infostealer malware used by hackers to steal:
-
Passwords
-
Credit card information
-
Bank account credentials
-
Cryptocurrency wallet data
Since 2022, cybercriminals have been purchasing and deploying the malware through underground online forums. Microsoft called it a “go-to tool for cybercriminals” due to its rapid evolution and ability to bypass security defenses.
Microsoft and Global Authorities Take Action
With a court order from the U.S. District Court for the Northern District of Georgia, Microsoft was able to:
-
Seize over 1,300 malicious domains, redirecting them to Microsoft sinkholes
-
Dismantle Lumma’s central command structure
-
Disable marketplaces selling the malware
-
Sever communications between infected devices and Lumma servers
Law enforcement agencies in the U.S., Europol, and Japan’s Cybercrime Control Center also assisted in the international crackdown.
“Working with law enforcement and industry partners, we have severed communications between the malicious tool and victims,” Microsoft stated.
Collaboration Across the Tech Industry
Microsoft credited a number of partners for their assistance in the operation, including:
-
Cloudflare
-
Bitsight
-
Lumen
These companies played key roles in identifying malicious infrastructure, monitoring traffic, and preventing further spread.
Targeted Sectors and Real-World Impact
Microsoft revealed that Lumma was used in numerous phishing campaigns and attacks on:
-
Online travel services (e.g., a March 2025 campaign impersonating Booking.com)
-
Gaming communities
-
Educational institutions
-
Manufacturing and logistics companies
-
Healthcare providers
-
Critical infrastructure systems
The malware’s versatility and frequent updates made it a preferred choice for threat actors across multiple industries.
Cybersecurity Reminder
This development underscores the ongoing threat of infostealer malware and the importance of:
-
Keeping Windows devices up-to-date
-
Using reliable antivirus and endpoint detection tools
-
Avoiding suspicious email links and downloads
-
Monitoring for unusual login activity and credential theft
Follow the Ridgewood blog has a brand-new new X account, we tweet good sh$t
https://twitter.com/TRBNJNews
https://truthsocial.com/@theridgewoodblog
https://mewe.com/jamesfoytlin.74/posts
#news #follow #media #trending #viral #newsupdate #currentaffairs #BergenCountyNews #NJBreakingNews #NJHeadlines #NJTopStories