Monday, April 28, 2025
Homecyber securityLumma Stealer Attacking Windows Users In India With Fake Captcha Pages

Lumma Stealer Attacking Windows Users In India With Fake Captcha Pages

Published on

SIEM as a Service

Follow Us on Google News

Cybersecurity experts are raising alarms over a new wave of attacks targeting Windows users in India, driven by the Lumma Stealer malware.

This advanced information-stealing malware is being distributed through fake CAPTCHA verification pages, a deceptive tactic that preys on unsuspecting users.

The campaign, which has gained significant traction since August 2024, highlights the evolving sophistication of cybercriminals leveraging social engineering and technical evasion techniques.

- Advertisement - Google News

How Lumma Stealer Operates

Lumma Stealer, first discovered in December 2022, operates under a Malware-as-a-Service (MaaS) model, allowing attackers to rent its capabilities for a low cost.

The malware is designed to extract sensitive data such as browser credentials, cryptocurrency wallet information, and system details from compromised devices.

It primarily targets Windows systems (versions 7 through 11) and employs advanced evasion techniques to bypass detection.

The current campaign utilizes fake CAPTCHA pages to trick users into executing malicious PowerShell commands.

These pages resemble legitimate human verification systems but instruct victims to paste commands into the Windows Run dialog box.

Once executed, these commands download and run the Lumma Stealer payload, initiating the infection process.

Lumma Stealer’s creators have incorporated innovative methods to avoid detection.

One notable technique involves using trigonometric calculations to mimic human-like mouse movements, enabling the malware to differentiate between real users and automated analysis environments.

Additionally, the malware obfuscates its code and employs anti-debugging measures to hinder reverse engineering efforts.

The infection chain often begins with phishing emails or compromised websites that redirect users to fake CAPTCHA pages hosted on content delivery networks (CDNs) or cloud storage platforms like Amazon S3.

These platforms lend an air of legitimacy to the malicious pages, increasing the likelihood of user compliance.

Impact on Indian Users

India has emerged as a significant target for Lumma Stealer campaigns due to its high volume of Windows users and growing digital footprint.

The malware’s affordability, priced as low as $10 per target on underground forums has made it a popular choice among cybercriminals.

Foresiet reports indicate that industries such as banking, healthcare, and telecom are particularly vulnerable, with attackers exploiting these sectors’ reliance on digital infrastructure.

To combat this threat, cybersecurity professionals recommend the following measures:

  • User Awareness: Educate individuals about phishing tactics and the risks of executing unsolicited commands.
  • Endpoint Protection: Deploy robust security solutions capable of detecting PowerShell-based attacks.
  • Regular Updates: Ensure all systems and applications are patched against known vulnerabilities.
  • Network Monitoring: Analyze traffic for unusual patterns indicative of malware activity.
  • Restrict Privileges: Limit administrative access to reduce the potential impact of infections.

The Lumma Stealer campaign underscores the need for heightened vigilance in an era of increasingly sophisticated cyber threats.

By combining technical innovation with social engineering, attackers have created a potent tool for data theft.

Organizations and individuals must adopt proactive security measures to mitigate risks and protect sensitive information from falling into malicious hands.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one...

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...

Obfuscation Techniques: A Key Weapon in the Ongoing War Between Hackers and Defenders

Obfuscation stands as a powerful weapon for attackers seeking to shield their malicious code...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one...

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...