Monday, April 28, 2025
HomeCyber Security NewsLumma Stealer Using Fake Google Meet & Windows Update Sites to Launch...

Lumma Stealer Using Fake Google Meet & Windows Update Sites to Launch “Click Fix” Style Attack

Published on

SIEM as a Service

Follow Us on Google News

Cybersecurity researchers continue to track sophisticated “Click Fix” style distribution campaigns that deliver the notorious Lumma Stealer malware to unsuspecting victims.

These increasingly sophisticated tactics, initially documented by Unit42 researchers Billy Melicher and Nabeel Mohamed, utilize social engineering techniques that trick users into executing malicious PowerShell scripts, ultimately leading to the deployment of this dangerous information-stealing malware.

Lumma Stealer

Lumma Stealer, also known as LummaC2 Stealer, is a potent information-stealing malware operating under a Malware-as-a-Service (MaaS) model that has been available on Russian-speaking underground forums since at least August 2022.

- Advertisement - Google News

Developed by a threat actor using the aliases “Shamel” and “Lumma,” this sophisticated C-language malware targets an extensive range of sensitive data on compromised systems, including cryptocurrency wallets, web browser information, email credentials, financial data, and sensitive files.

The malware has shown remarkable adaptability, with recent versions implementing the ChaCha20 cipher for configuration decryption, demonstrating the developers’ commitment to evading analysis tools and detection mechanisms.

The “Click Fix” distribution method represents a particularly insidious social engineering technique first documented in 2024.

This method creates web pages that covertly insert malicious code into the victim’s clipboard when they interact with seemingly legitimate verification interfaces.

The technique stands out for its psychological manipulation: rather than relying on traditional malicious downloads, it instructs users themselves to paste preloaded malicious code into their Run prompt (accessed via Windows+R), essentially tricking victims into self-infection.

Evolving “Click Fix” Distribution Tactics

According to the Cyber Security News technical analysis, This approach involves web pages that insert scripts into the clipboard, prompting users to paste them into the Run dialog.

For instance, a Fake Google Meet Page hosted on Google Sites instructed users to verify their accounts by executing a PowerShell command.

This command retrieved a script from “tlgrm-redirect[.]icu/1.txt,” initiating a complex infection chain.

Another campaign involved a Fake Windows Update Site at “windows-update[.]site,” where users were prompted to execute a PowerShell command that retrieved a malicious payload from “overcoatpassably[.]shop.”

From a technical analysis perspective, recent campaigns have involved specific malicious files.

 These include a PowerShell script (SHA256: 909ed8a1351f9a21ebdd5d8efb4147145f12d5d24225dbd44cd2800a1f94a596) and a zip archive (SHA256: 0608775a345c5a0869418ffddd1f694cb888fe8acde6d34543516db1a01e3ef8) containing Lumma Stealer components.

This approach allows attackers to bypass corporate firewalls and maintain a false sense of security for potential victims.

Victims are tricked into executing PowerShell commands that download and execute payloads. These scripts often involve base64-encoded data, making them difficult to detect without specific monitoring tools.

Attackers use zip archives containing decoy files and legitimate executables to side-load malicious DLLs.

This technique provides excellent camouflage, as the process appears legitimate while the malicious activity occurs through the side-loaded DLL.

The malware communicates with command and control (C2) domains, including “web-security3[.]com,” “codxefusion[.]top,” “techspherxe[.]top,” and “farmingtzricks[.]top.”

These domains play a crucial role in the malware’s operation, facilitating data exfiltration and command execution.

The evolving tactics of Lumma Stealer highlight the ongoing challenge of defending against sophisticated malware campaigns.

By combining social engineering with technical evasion techniques, attackers continue to successfully bypass traditional security controls.

Organizations must maintain awareness of these emerging tactics and adapt their defensive strategies accordingly to mitigate the risks associated with Lumma Stealer.

Find this News Interesting! Follow us on Google NewsLinkedIn, and X to Get Instant Updates!

Kaaviya
Kaaviya
Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.

Latest articles

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...

Obfuscation Techniques: A Key Weapon in the Ongoing War Between Hackers and Defenders

Obfuscation stands as a powerful weapon for attackers seeking to shield their malicious code...

React Router Vulnerabilities Allow Attackers to Spoof Content and Alter Values

The widely used React Router library, a critical navigation tool for React applications, has...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...

Obfuscation Techniques: A Key Weapon in the Ongoing War Between Hackers and Defenders

Obfuscation stands as a powerful weapon for attackers seeking to shield their malicious code...