Technologist Mag
  • Home
  • Tech News
  • AI
  • Apps
  • Gadgets
  • Gaming
  • Guides
  • Laptops
  • Mobiles
  • Wearables
  • More
    • Web Stories
    • Trending
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On

Sonic And Pac-Man Crossover DLC Packs Announced

20 August 2025

With the Pixel Watch 4, Google’s Smartwatch Is Finally Repairable

20 August 2025

There Are No Ghosts at the Grand Preview – Renovating A Haunted Hotel Isn’t Easy, But It Is Quite Musical

20 August 2025

An Exclusive Look at Reliability Labs, Where Google Stress-Tests Pixel Hardware

20 August 2025

Keeper Is A Salvador Dali-Inspired Surrealist Adventure With No Dialogue, No Combat, And A Walking Lighthouse

20 August 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Technologist Mag
SUBSCRIBE
  • Home
  • Tech News
  • AI
  • Apps
  • Gadgets
  • Gaming
  • Guides
  • Laptops
  • Mobiles
  • Wearables
  • More
    • Web Stories
    • Trending
    • Press Release
Technologist Mag
Home » Microsoft and DOJ deal crushing blow to Lumma malware empire
Tech News

Microsoft and DOJ deal crushing blow to Lumma malware empire

By technologistmag.com21 May 20253 Mins Read
Share
Facebook Twitter Reddit Telegram Pinterest Email

Microsoft, in partnership with the U.S. Department of Justice (DOJ), took a major step in dismantling one of the most prolific cybercrime tools currently in circulation. Microsoft’s Digital Crimes Unit (DCU) collaborated with the DOJ, Europol, and several global cybersecurity firms to disrupt the Lumma Stealer malware network — a malware-as-a-service (MaaS) platform implicated in hundreds of thousands of digital breaches worldwide.

According to Microsoft, Lumma Stealer infected over 394,000 Windows machines between March and mid-May 2025. The malware has been a favored tool amongst cybercriminals for stealing login credentials and sensitive financial information including cryptocurrency wallets. It’s been used for extortion campaigns against schools, hospitals, and infrastructure providers. According to the DOJ website, “the FBI has identified at least 1.7 million instances where LummaC2 was used to steal this type of information.”

With a court order from the U.S. District Court for the Northern Districts of Georgia, Microsoft took down roughly 2,300 malicious domains associated with Lumma’s infrastructure. The DOJ simultaneously took down five critical LummaC2 domains, which acted as command-and-control centers for cybercriminals deploying the malware. These domains now redirect to a government seizure notice.

International assistance came from Europol’s European Cybercrime Centre (EC3) and Japan’s JC3, who coordinated efforts to block regional servers. Cybersecurity firms like Bitsight, Cloudflare, ESET, Lumen, CleanDNS, and GMO Registry assisted in identifying and dismantling web infrastructure.

Inside the Lumma operation

Lumma, also known as LummaC2, has been operating since 2022, possibly earlier, and makes its info-stealing malware available for sale through encrypted forums and Telegram channels. The malware is designed for ease of use and is often bundled with obfuscation tools to help it bypass antivirus software. Distribution techniques include spear-phishing emails, spoofed brand websites, and malicious online ads known as “malvertising.”

Cybersecurity researchers say Lumma is particularly dangerous because it allows criminals to rapidly scale attacks. Buyers can customize payloads, track stolen data, and even get customer support via a dedicated user panel. Microsoft Threat Intelligence previously linked Lumma to notorious Octo Tempest gang, also known as “Scattered Spider.”

In one phishing campaign earlier this year, hackers were able to spoof Booking.com and used Lumma to harvest financial credentials from unsuspecting victims.

Who’s behind it?

Authorities believe the developer of Lumma goes by the alias “Shamel” and operates out of Russia. In a 2023 interview, Shamel claimed to have 400 active clients and even bragged about branding Lumma with a dove logo and the slogan: “Making money with us is just as easy.”

Long-term disruption, not a knockout

While the takedown is significant, experts warn that Lumma and tools like it are rarely eradicated for good. Still, Microsoft and the DOJ say these actions severely hinder and disrupt criminal operations by cutting off their infrastructure and revenue streams. Microsoft will use the seized domains as sinkholes to gather intelligence and further protect victims.

This situation highlights the need for international cooperation in cybercrime enforcement. DOJ officials emphasized the value of public-private partnerships, while the FBI noted that court-authorized disruptions remain a critical tool in the government’s cybersecurity playbook.

As Microsoft’s DCU continues its work, this Lumma crackdown sets a strong precedent for what can be accomplished when industry and government specialists collaborate to eliminate threats.

As more of these organizations are uncovered and disrupted, remember to protect yourself by changing your passwords frequently and avoid clicking links from unknown senders.











Share. Facebook Twitter Pinterest LinkedIn Telegram Reddit Email
Previous ArticleGoogle’s Android Chief Hopes Its ‘New Era’ Will Get People to Ditch Their iPhones
Next Article I Tried Out Dyson’s New PencilVac. Here’s What You Need to Know

Related Articles

With the Pixel Watch 4, Google’s Smartwatch Is Finally Repairable

20 August 2025

An Exclusive Look at Reliability Labs, Where Google Stress-Tests Pixel Hardware

20 August 2025

The Fitbit App Is Turning Into an AI-Powered Personal Health Coach

20 August 2025

The Best Early Labor Day Deals and Sales

20 August 2025

Our Editors’ Favorite Office Chair Is $50 Off

20 August 2025

Hey Students, You Can Get Discounts With Your College Email. Here’s How

20 August 2025
Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Don't Miss

With the Pixel Watch 4, Google’s Smartwatch Is Finally Repairable

By technologistmag.com20 August 2025

There are two T2 screws located under the watch band pocket—unscrew those, and you can…

There Are No Ghosts at the Grand Preview – Renovating A Haunted Hotel Isn’t Easy, But It Is Quite Musical

20 August 2025

An Exclusive Look at Reliability Labs, Where Google Stress-Tests Pixel Hardware

20 August 2025

Keeper Is A Salvador Dali-Inspired Surrealist Adventure With No Dialogue, No Combat, And A Walking Lighthouse

20 August 2025

The Fitbit App Is Turning Into an AI-Powered Personal Health Coach

20 August 2025
Technologist Mag
Facebook X (Twitter) Instagram Pinterest
  • Privacy
  • Terms
  • Advertise
  • Contact
© 2025 Technologist Mag. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.