Sunday, May 18, 2025
Homecyber securityLUMMAC.V2 Stealer Uses ClickFix Technique to Deceive Users into Executing Malicious Commands

LUMMAC.V2 Stealer Uses ClickFix Technique to Deceive Users into Executing Malicious Commands

Published on

SIEM as a Service

Follow Us on Google News

The LUMMAC.V2 infostealer malware, also known as Lumma or Lummastealer, has emerged as a significant threat, employing the cunning “ClickFix” social engineering technique to compromise unsuspecting users.

This malware, rewritten from C to C++ with an advanced binary morpher, targets a broad spectrum of sensitive data, including credentials, emails, personal details, screenshots, and cookies from browsers, crypto wallets, password managers, and more.

Distributed through deceptive means, LUMMAC.V2 tricks users into executing malicious commands by presenting fake CAPTCHA verification pages that prompt them to open the Windows Run dialog box, paste a pre-copied command, and execute it.

- Advertisement - Google News
Malicious Commands
Source code of the Fake captcha

This initiates a hidden PowerShell payload, setting off a complex infection chain that can devastate personal and system security.

Multi-Stage Infection Chain and Stealthy Execution

The infection typically begins with seemingly innocent internet searches for cracked software, movies, or music, where malicious links redirect users to fraudulent CAPTCHA pages.

Once the user follows the deceptive instructions, a PowerShell command downloads a malicious script from a remote server, often hidden from view with the -W Hidden parameter.

According to Google Report, this script, such as the one fetching a file named pnk3.txt, orchestrates the download of a ZIP archive containing the malware, extracts it to the user’s AppData folder, and executes a disguised executable like Perspective.exe.

For persistence, LUMMAC.V2 adds registry entries to ensure it runs on system startup.

Malicious Commands
Extraction of the injected payload

The malware employs varied delivery mechanisms, including DLL hijacking, where a legitimate program loads a malicious DLL like tak_deco_lib.dll, process hollowing to inject code into trusted processes such as BitlockerToGo.exe, and AutoIt-based droppers that use obfuscated scripts to evade detection.

These techniques highlight the malware’s sophistication, as it masks its activities within legitimate processes and employs anti-analysis checks to thwart security tools.

Data Exfiltration and Robust C2 Communication

Once deployed, LUMMAC.V2 establishes communication with its command-and-control (C2) servers through persistent DNS queries and TLS v1.2 connections, often masked by Cloudflare’s reverse proxy services to obscure the true server locations.

After confirming server availability with a heartbeat signal (act=life), it retrieves obfuscated configuration data encrypted with Base64 and XOR techniques, later staging sensitive information like cryptocurrency wallet data and browser files for exfiltration via HTTP POST requests.

The malware’s ability to request additional payloads or instructions underscores its adaptability and the ongoing risk it poses post-infection.

Targeting an extensive list of applications and personal files, LUMMAC.V2 exemplifies the escalating danger of infostealer malware in today’s digital landscape, urging users to exercise caution with online interactions and maintain robust security defenses against such stealthy threats.

As cybercriminals refine their tactics, awareness and proactive measures remain critical to countering the insidious reach of threats like LUMMAC.V2, which exploit human curiosity and trust to devastating effect.

Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...