Wednesday, May 14, 2025
HomeBrowserWeaponized PDFs Deliver Lumma InfoStealer Targeting Educational Institutions

Weaponized PDFs Deliver Lumma InfoStealer Targeting Educational Institutions

Published on

SIEM as a Service

Follow Us on Google News

A sophisticated malware campaign leveraging the Lumma InfoStealer has been identified, targeting educational institutions to distribute malicious files disguised as PDF documents.

This campaign employs compromised school infrastructure to deliver weaponized LNK (shortcut) files masquerading as legitimate PDFs, initiating a multi-stage infection process.

The Lumma InfoStealer, a Malware-as-a-Service (MaaS) offering, is designed to exfiltrate sensitive data such as passwords, browser information, and cryptocurrency wallet credentials.

- Advertisement - Google News
Lumma InfoStealer
mind map of the campaign

The primary infection vector involves users downloading files that appear to be routine documents, such as school fee structures.

However, these files are malicious LNK files hosted on a WebDAV server.

When executed, the LNK files trigger a chain of events involving PowerShell commands and legitimate executables like mshta.exe, which are exploited to download and deploy the Lumma malware.

Lumma InfoStealer
Encrypted Powershell Script

This highlights the increasing sophistication of phishing tactics used by threat actors to bypass security measures and deceive users.

Advanced Evasion Techniques

Lumma InfoStealer employs advanced evasion techniques, including obfuscated JavaScript and encrypted payloads, to avoid detection.

Notably, it uses unconventional command-and-control (C2) communication methods by leveraging trusted platforms such as Steam profiles.

According to the CloudSek Report, this approach allows the malware to cloak its activities while maintaining communication with its operators.

For example, the malware parses Steam profile pages to extract encrypted C2 domains using decryption algorithms like Caesar cipher.

Once deployed, Lumma InfoStealer scans compromised systems for sensitive data stored in specific file formats or containing keywords like “wallet,” “password,” or “bitcoin.”

It targets industries beyond education, including finance, healthcare, technology, and media.

The malware’s ability to exfiltrate data from cryptocurrency wallets, browser extensions, and email clients underscores its broad scope and potential for significant financial and reputational damage.

Urgent Need for Robust Cybersecurity Measures

The use of educational institutions as a distribution channel for malware highlights vulnerabilities in organizational cybersecurity frameworks.

Threat actors exploit these weaknesses to infiltrate networks and propagate malicious payloads.

The Lumma campaign emphasizes the importance of proactive measures such as employee awareness training, regular security audits, and advanced threat detection systems.

As cybercriminals continue to refine their tactics, organizations must adopt a multi-layered defense strategy to mitigate risks associated with sophisticated malware campaigns like Lumma InfoStealer.

Enhanced monitoring of network traffic and the deployment of endpoint protection solutions can help identify and neutralize threats before they cause irreparable harm.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Weaponized PyPI Package Targets Developers to Steal Source Code

Security researchers at RL have discovered a malicious Python package called "solana-token" on PyPI...

Microsoft Alerts on AD CS Flaw Enabling Remote Denial-of-Service Attacks

Microsoft has issued a security advisory for a newly identified vulnerability in Active Directory...

Chinese Hackers Exploit SAP NetWeaver Zero-Day Vulnerability to Target Critical Infrastructure

EclecticIQ analysts have uncovered a sophisticated cyber-espionage campaign orchestrated by China-nexus nation-state Advanced Persistent...

Researchers Unveil New Threat-Hunting Techniques to Detect Azure Managed Identity Abuse

A group of cybersecurity specialists from Hunters, working under the prestigious Team Axon, have...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Weaponized PyPI Package Targets Developers to Steal Source Code

Security researchers at RL have discovered a malicious Python package called "solana-token" on PyPI...

Microsoft Alerts on AD CS Flaw Enabling Remote Denial-of-Service Attacks

Microsoft has issued a security advisory for a newly identified vulnerability in Active Directory...

Chinese Hackers Exploit SAP NetWeaver Zero-Day Vulnerability to Target Critical Infrastructure

EclecticIQ analysts have uncovered a sophisticated cyber-espionage campaign orchestrated by China-nexus nation-state Advanced Persistent...