The Lumma Stealer malware is being distributed through a new and increasingly deceptive method: fake human verification pages. This sophisticated phishing campaign, primarily targeting Windows users, tricks individuals into running malicious PowerShell commands, leading to the theft of sensitive information. Discovered by Unit42 at Palo Alto Networks and further investigated by cybersecurity firm CloudSEK, this malware distribution technique highlights the evolving tactics used by cybercriminals to exploit unsuspecting victims.
This campaign uses fake Google CAPTCHA pages hosted on various platforms, including Content Delivery Networks (CDNs). Users are prompted to verify their humanity by clicking a button labeled "I'm not a robot." However, after clicking the button, they are asked to execute a series of commands that run a hidden PowerShell script.
The malicious script is copied to the user’s clipboard using JavaScript and, once pasted into the Run dialog (Win+R), the command fetches the Lumma Stealer malware from a remote server, compromising the user’s machine.
This malware can steal sensitive information, including browser credentials, cryptocurrency wallets, and system data, posing a serious threat to individuals and organizations alike.
Cybersecurity experts emphasize the significant threat posed by PowerShell-based attacks. According to the 2024 Data Breach Investigations Report by Verizon, over 80% of malware attacks on Windows systems leverage PowerShell commands in some form, making it a favored tool for attackers to bypass traditional defenses.
Additionally, Vikram Thakur, Technical Director at Symantec, explains: “The use of PowerShell in malware campaigns is particularly dangerous because it operates within a legitimate system process, making it difficult for traditional antivirus solutions to detect. Attackers exploit this to their advantage, gaining control of victim systems while evading detection.”
The Lumma Stealer campaign incorporates several advanced evasion tactics:
While this campaign currently focuses on distributing Lumma Stealer, cybersecurity experts warn that the same techniques could be used to distribute other forms of malware, including ransomware or advanced persistent threats (APTs). The modular nature of the attack allows threat actors to adjust payloads based on their objectives, making this campaign particularly dangerous.
To mitigate the risk of infection from this campaign, security experts recommend the following measures:
Several malicious URLs have been identified as part of this campaign:
The Lumma Stealer malware campaign is a stark reminder of the evolving tactics used by cybercriminals to distribute malware. By exploiting fake CAPTCHA pages and using PowerShell-based attacks, these threat actors are able to bypass traditional defenses and compromise user systems. Organizations must remain vigilant, educate their users, and implement comprehensive security measures to defend against these types of sophisticated phishing attacks.