logo
Microsoft Corporation (MSFT) and Global Law Enforcement Dismantle Lumma Stealer Malware Network Infecting 394,000 Devices

Microsoft Corporation (MSFT) and Global Law Enforcement Dismantle Lumma Stealer Malware Network Infecting 394,000 Devices

Yahoo22-05-2025

Microsoft Corporation (NASDAQ:MSFT) revealed Wednesday that it has dismantled the Lumma Stealer malware operation, which infected more than 394,000 Windows devices worldwide from March 16 to May 16. The malware, widely used by hackers, stole passwords, credit cards, bank information, and cryptocurrency wallets.
Copyright: ymgerman / 123RF Stock Photo
Using a court order from the U.S. District Court for the Northern District of Georgia, MSFT's Digital Crimes Unit seized critical web domains powering Lumma's infrastructure. The U.S. Department of Justice took control of the malware's command servers and shut down online marketplaces selling the malware. Europol and other partners helped seize over 1,300 domains, many redirected to Microsoft sinkholes.
Tech companies, including Cloudflare, Bitsight, and Lumen, also joined the operation. Japan's cybercrime control center suspended the local Lumma infrastructure.
Since 2022, Lumma has been a top tool for cybercriminals due to its advanced capabilities and ease of spreading. Microsoft highlighted its role in a March 2025 phishing scam impersonating Booking.com. The malware also targeted online gaming, education, manufacturing, logistics, and healthcare sectors.
Microsoft Corporation (NASDAQ:MSFT) confirmed the takedown breaks the link between attackers and victims, disrupting a major global cybercrime network and stopping ongoing financial theft and data breaches.
While we acknowledge the potential of MSFT to grow, our conviction lies in the belief that some AI stocks hold greater promise for delivering higher returns and have limited downside risk. If you are looking for an AI stock that is more promising than MSFT and that has 100x upside potential, check out our report about this
READ NEXT: and
Disclosure: None.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

How to set up an Apple legacy contact, in case you die
How to set up an Apple legacy contact, in case you die

Yahoo

time8 hours ago

  • Yahoo

How to set up an Apple legacy contact, in case you die

If you use Apple devices regularly, then your Apple account has lots of important files and data attached to it—including photos and videos of precious memories and extensive email archives that you need to hang on to. Apple gives you many ways to make sure this data is looked after, including setting up a couple of key contacts who become attached to your account: a recovery contact (who can help you get back into your account if you're locked out), and a legacy contact (who can get into your account if you die.) There are good reasons for setting up both of these contacts, and it doesn't take long to do. You can specify more than one contact in each case, and change your chosen contacts at any time. Let's start with a recovery contact, a specified person you trust and can turn to if you find yourself locked out of your account. It's one of the most reliable methods out there for restoring access to your Apple account, because it relies on an actual human being who knows you rather than passwords or authenticator apps. Apple says your recovery contact 'should be a person that you know and trust, like a family member or a close friend.' You can set up to five recovery contacts for your account. If you're using Family Sharing with your account, Apple will recommend the other people in your family as your contacts, but you're free to choose who you like. Your recovery contacts will need access to an iPhone, iPad, or Mac, and their own Apple account—so you can't pick any friends and relatives who only use Android or Windows. Apple won't store any information about who your contacts are, so it's important that you remember who you've nominated (you can't recover your recovery contacts). To set up your recovery contact(s) on an iPhone or iPad, open Settings, tap on your name, pick Sign-In & Security > Recovery Contacts, then follow the instructions on screen. You can also do this from a Mac, via System Settings: Click on your name, then Sign-In & Security, then Recovery Contacts. If it's someone already in your Family Sharing group, the contact is added automatically; if not, they'll need to accept your request. If you get into trouble accessing your account, your recovery contacts can help you out. From Settings on an iPhone or iPad, or System Settings on a Mac, they need to select their name, then choose Sign-In & Security > Account Recovery. Once they select your name, they'll get a recovery code which they can pass along to you, which will help confirm your identity to Apple and get you back into your account. It's never pleasant to think about death, but your chances of escaping it are zero—so you want to make sure that getting your affairs in order is as straightforward as possible for the loved ones you leave behind. Of course, our digital legacies are becoming a bigger and bigger part of our worldly goods and possessions. Apple lets you specify what it calls a legacy contact, someone who you grant permission to access your Apple account after you're gone. This includes access to your photos, messages, notes, and files, but it doesn't cover passwords or payment information. You can specify more than one legacy contact, and the people you pick don't have to be using Apple devices or have an Apple account. On an iPhone or iPad, open up Settings, tap your name, then pick Sign-In & Security > Legacy Contact to choose someone. If you're on macOS, from System Settings select your name, and then click Sign-In & Security > Legacy Contact. No confirmation is required, but you will be prompted to send your chosen contacts the digital key they will need to access your account in the future. Before Apple will let these designated contacts into your account, they'll need both the digital key you gave them and a copy of your death certificate. Once the administrative work is out of the way, they'll be granted access to a special legacy contact Apple account, through which they can get to the information you've left behind. 'Your legacy contact has access to your data for a limited time—three years from when the first legacy account request is approved—after which the account is permanently deleted,' Apple says. Note that if you've specified more than one contact, they can all take action on your data and files independently of each other.

Microsoft takes down malware found on 394,000 Windows PCs
Microsoft takes down malware found on 394,000 Windows PCs

Fox News

time14 hours ago

  • Fox News

Microsoft takes down malware found on 394,000 Windows PCs

Infostealer malware has been on the rise recently, and that's evident from the billions of user records leaked online in the past year alone. This type of malware targets everything from your name, phone number and address to financial details and cryptocurrency. Leading the charge is the Lumma infostealer. I have been reporting on this malware since last year, and security researchers have called it one of the most dangerous infostealers, infecting millions. There have been countless incidents of Lumma targeting people's personal data (more on this later), but the good news is that Microsoft has taken it down. The Redmond-based company announced it has dismantled the Lumma Stealer malware operation with the help of law enforcement agencies around the world. Microsoft confirmed that it has successfully taken down the Lumma Stealer malware network in collaboration with law enforcement agencies around the world. In a blog post, the company revealed that its Digital Crimes Unit had tracked infections on more than 394,000 Windows devices globally between March 16 and May 16. Lumma was a go-to tool for cybercriminals, often used to siphon sensitive information like login credentials, credit card numbers, bank account details and cryptocurrency wallet data. The malware's reach and impact made it a favored choice among threat actors for financial theft and data breaches. To disrupt the malware's operation, Microsoft obtained a court order from the U.S. District Court for the Northern District of Georgia, which allowed the company to take down key domains that supported Lumma's infrastructure. This was followed by the U.S. Department of Justice stepping in to seize control of Lumma's core command system and shut down marketplaces where the malware was being sold. International cooperation played a major role as well. Japan's cybercrime unit helped dismantle Lumma's locally hosted infrastructure, while Europol assisted in actions against hundreds of domains used in the operation. In total, over 1,300 domains were seized or redirected to Microsoft-managed sinkholes to prevent further damage. Microsoft says this takedown effort also included support from industry partners such as Cloudflare, Bitsight and Lumen, which helped dismantle the broader ecosystem that enabled Lumma to thrive. Lumma is a Malware-as-a-Service (MaaS) that has been marketed and sold through underground forums since at least 2022. Over the years, its developers have released multiple versions to continually improve its capabilities. I first reported on Lumma in February 2024, when it was used by hackers to access Google accounts using expired cookies that contained login information. Lumma continued targeting users, with reports in October 2024 revealing it was impersonating fake human verification pages to trick Windows users into sharing sensitive information. The malware wasn't limited to Windows. In January 2024, security researchers found the infostealer malware was targeting 100 million Mac users, stealing browser credentials, cryptocurrency wallets and other personal data. To protect yourself from the evolving threat of infostealer malware, which continues to target users through sophisticated social engineering tactics, consider taking these six essential security measures: 1. Be skeptical of CAPTCHA prompts: Legitimate CAPTCHA tests never require you to press Windows + R, copy commands or paste anything into PowerShell. If a website instructs you to do this, it's likely a scam. Close the page immediately and avoid interacting with it. 2. Don't click links from unverified emails and use strong antivirus software: Many infostealer attacks start with phishing emails that impersonate trusted services. Always verify the sender before clicking on links. If an email seems urgent or unexpected, go directly to the company's official website instead of clicking any links inside the email. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices. 3. Enable two-factor authentication: Enable two-factor authentication (2FA) whenever possible. This adds an extra layer of security by requiring a second form of verification, such as a code sent to your phone, in addition to your password. 4. Keep devices updated: Regularly updating your operating system, browser and security software ensures you have the latest patches against known vulnerabilities. Cybercriminals exploit outdated systems, so enabling automatic updates is a simple but effective way to stay protected. 5. Monitor your accounts for suspicious activity and change your passwords: If you've interacted with a suspicious website, phishing email or fake login page, check your online accounts for any unusual activity. Look for unexpected login attempts, unauthorized password resets or financial transactions that you don't recognize. If anything seems off, change your passwords immediately and report the activity to the relevant service provider. Also, consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed Password Managers of 2025 here. 6. Invest in a personal data removal service: Consider using a service that monitors your personal information and alerts you to potential breaches or unauthorized use of your data. These services can provide early warning signs of identity theft or other malicious activities resulting from infostealer malware or similar attacks. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. ​Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web. Microsoft's takedown of the Lumma Stealer malware network is a major win in the fight against infostealers, which have fueled a surge in data breaches over the past year. Lumma had become a go-to tool for cybercriminals, targeting everything from browser credentials to crypto wallets across Windows and Mac systems. I've been tracking this malware since early 2024, and its ability to impersonate human verification pages and abuse expired cookies made it especially dangerous. Do you feel tech companies are doing enough to protect users from malware like this? Let us know by writing us at For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Follow Kurt on his social channels Answers to the most asked CyberGuy questions: New from Kurt: Copyright 2025 All rights reserved.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store