{"id":102897,"date":"2025-02-10T20:03:36","date_gmt":"2025-02-10T12:03:36","guid":{"rendered":"https:\/\/version-2.com\/?p=102897"},"modified":"2025-02-01T20:08:27","modified_gmt":"2025-02-01T12:08:27","slug":"lumma-stealer-a-fast-growing-infostealer-threat","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2025\/02\/lumma-stealer-a-fast-growing-infostealer-threat\/","title":{"rendered":"Lumma Stealer: A fast-growing infostealer threat"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"102897\" class=\"elementor elementor-102897\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71ae5294 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71ae5294\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4a899f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e9119cd\" data-id=\"1e9119cd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f04f8cb elementor-widget elementor-widget-text-editor\" data-id=\"4f04f8cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div id=\"content-c11312761\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>\u00a0<\/p><p><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Thumbnails_250x250\/lumma_thumbnail_sm.jpg\" alt=\"\" width=\"250\" height=\"250\" \/><\/p><div><div id=\"content-c11312186\" class=\"frame frame-default frame-type-text frame-layout-0\"><p><em>In their biannual ESET Threat Report, ESET researchers have revealed a massive rise in detections of Lumma Stealer, which quietly threatens consumers and businesses alike.<\/em><\/p><p>ESET Research is back with a frightening statistic \u2014 Detections of Lumma Stealer, an infostealer we previously reported as <a href=\"https:\/\/www.eset.com\/blog\/consumer\/how-minecraft-and-game-modding-can-undermine-your-security\/\" target=\"_blank\" rel=\"noopener\">a threat to gamers<\/a>, increased 369% between H1 and H2 2024. This is problematic, as infostealers like Lumma continue to plague both consumer and business systems, usually without the knowledge of their owners.<\/p><p>While infostealers are a sneaky lot, they are not without their vulnerabilities \u2014 which ESET products can capitalize on, to your security benefit.<\/p><\/div><div id=\"content-c11312187\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Let Lumma tell you a story<\/h3><\/header><p>Also known as <a href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/details\/win.lumma\" target=\"_blank\" rel=\"noopener\">LummaC2 Stealer<\/a>, this malware-as-a-service mostly targets cryptocurrency wallets, user credentials and two-factor authentication browser extensions, but it also tries to exfiltrate various other data from compromised machines.<\/p><p class=\"alert\"><strong>What is malware-as-a-service (MaaS)?<\/strong><\/p><p>Not unlike modern software offers, malware-as-a-service is <a href=\"https:\/\/digitalsecurityguide.eset.com\/apac\/democratization-of-cybercrime-understanding-maas-and-infostealers\" target=\"_blank\" rel=\"noopener\">a business model<\/a> that provides interested parties with ready-made and instantly deployable malware solutions. Typically offered on underground hacking forums found on the dark web, MaaS operators supply a variety of malware either as a one-time purchase or via a subscription. Ultimately, this easy access enables even those without advanced technical skills to launch cyberattacks, <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/malware-service-top-threat\/\" target=\"_blank\" rel=\"noopener\">increasing their prevalence<\/a>.<\/p><p>Lumma Stealer first appeared in August 2022 and is available for sale through a tiered pricing structure on hacking forums and Telegram. The cost ranges from $250 to $20,000, with the most expensive tier letting buyers access the infostealer\u2019s source code \u2014 enabling-would-be criminals to act as resellers.<\/p><\/div><div id=\"content-c11312188\" class=\"frame frame-default frame-type-image frame-layout-0\"><div class=\"ce-image ce-center ce-above\"><div class=\"ce-gallery\" data-ce-columns=\"1\" data-ce-images=\"1\"><div class=\"ce-outer\"><div class=\"ce-inner\"><div class=\"ce-row\"><div class=\"ce-column\"><img decoding=\"async\" src=\"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/lumma_detection_h2_2024.png\" alt=\"\" width=\"680\" height=\"353\" \/><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"content-c11312189\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>Because Lumma is a ready-made malware solution, it is easier for novice threat actors to share around. Its ease of use and breadth of functions alone make it an attractive choice for would-be attackers \u2014 but the fact that it can be spread through multiple vectors, unnoticed, makes it even more useful.<\/p><\/div><div id=\"content-c11312190\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Exploring attack vectors and ESET telemetry<\/h3><\/header><p>While Lumma Stealer can spread through a variety of distribution vectors, some methods are more clever than others. One particularly sophisticated campaign discovered in October 2024 delivered Lumma Stealer through <a href=\"https:\/\/www.darkreading.com\/cyberattacks-data-breaches\/trick-captcha-lumma-stealer-malware\" target=\"_blank\" rel=\"noopener\">fake CAPTCHA sites<\/a>, which, after successful \u201cverification,\u201d delivered the infostealer onto the victim\u2019s device.<\/p><p>Other avenues enabling Lumma Stealer\u2019s spread include cracked installations of popular open-source or paid apps such as <a href=\"https:\/\/gridinsoft.com\/blogs\/malicious-fake-chatgpt\/\" target=\"_blank\" rel=\"noopener\">ChatGPT<\/a> or <a href=\"https:\/\/thehackernews.com\/2024\/01\/beware-youtube-videos-promoting-cracked.html\" target=\"_blank\" rel=\"noopener\">Vegas Pro<\/a>. The infostealer can also spread via phishing emails or Discord messages, making it more likely to land in the inbox of even the youngest online users.<\/p><p class=\"alert\"><strong>Did you know?<\/strong><\/p><p>Message boards like Discord can <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/discord-still-a-hotbed-of-malware-activity-now-apts-join-the-fun\/\" target=\"_blank\" rel=\"noopener\">play a major role<\/a> in the spread of malicious software and scams. This is due to the way such places act as a kind of digital crossroads for online human activity, making them ripe for abuse. Moreover, threat actors can abuse the <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/discord-will-switch-to-temporary-file-links-to-block-malware-delivery\/\" target=\"_blank\" rel=\"noopener\">content delivery networks<\/a> of such online\/cloud platforms to distribute malware, as well.<\/p><p>ESET also detected a campaign in which the Win\/Rozena.ADZ injector delivered Lumma Stealer via compromised videos on online marketplaces and websites with adult content. Likewise, Lumma Stealer was detected in KMS activators for pirated copies of Windows.<\/p><p>Last but not least, in June 2024, ESET Research reported that players of the popular Hamster Kombat mobile clicker game <a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/tap-estry-threats-targeting-hamster-kombat-players\/?utm_source=pdf&amp;utm_medium=referral&amp;utm_campaign=eset_threat_report_h22024\" target=\"_blank\" rel=\"noopener\">were being targeted<\/a>, with cryptors containing Lumma Stealer hidden on GitHub repositories in the guise of helpful automation tools for the game.<\/p><\/div><div id=\"content-c11312191\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Just one of many infostealers on the loose<\/h3><\/header><p>ESET telemetry for H2 2024 registered the highest number of Lumma Stealer attack attempts in Peru, Poland, Spain, Mexico and Slovakia. However, Lumma is not the only infostealer going around, and in general, the top five countries targeted by infostealer attacks in H2 2024 were Japan, Spain, Turkey, Poland and Italy.<\/p><\/div><div id=\"content-c11312192\" class=\"frame frame-default frame-type-image frame-layout-0\"><div class=\"ce-image ce-center ce-above\"><div class=\"ce-gallery\" data-ce-columns=\"1\" data-ce-images=\"1\"><div class=\"ce-outer\"><div class=\"ce-inner\"><div class=\"ce-row\"><div class=\"ce-column\"><img decoding=\"async\" src=\"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/global_infostealer_detections.png\" alt=\"\" width=\"638\" height=\"324\" \/><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"content-c11312193\" class=\"frame frame-default frame-type-image frame-layout-0\"><div class=\"ce-image ce-center ce-above\"><div class=\"ce-gallery\" data-ce-columns=\"1\" data-ce-images=\"1\"><div class=\"ce-outer\"><div class=\"ce-inner\"><div class=\"ce-row\"><div class=\"ce-column\">\u00a0<\/div><div class=\"ce-column\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/top_10_infostealer_families.png\" alt=\"\" width=\"627\" height=\"281\" \/><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"content-c11312194\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>Among other notable infostealers is Formbook, first discovered in 2016 and mainly spread through email phishing. This infostealer collects clipboard data, keystrokes, screenshots and cached browser data, and uses sophisticated obfuscation techniques to prevent deeper analysis. Moreover, it\u2019s been detected as part of large-scale <a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/phishing-targeting-polish-smbs-continues-modiloader\/\" target=\"_blank\" rel=\"noopener\">ModiLoader<\/a> and <a href=\"https:\/\/www.welivesecurity.com\/2023\/05\/25\/shedding-light-acecryptor-operation\/\" target=\"_blank\" rel=\"noopener\">AceCryptor<\/a> campaigns in Central and Eastern European states such as Poland, Romania, Czechia and Croatia.<\/p><\/div><div id=\"content-c11312195\" class=\"frame frame-default frame-type-image frame-layout-0\"><div class=\"ce-image ce-center ce-above\"><div class=\"ce-gallery\" data-ce-columns=\"1\" data-ce-images=\"1\"><div class=\"ce-outer\"><div class=\"ce-inner\"><div class=\"ce-row\"><div class=\"ce-column\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/modiloader_phishing.png\" alt=\"\" width=\"650\" height=\"184\" \/><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"content-c11312196\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Spy another day<\/h3><\/header><p>Infostealers are so damaging because being compromised even for a short time can be quite disastrous for both individuals and businesses. Once an infostealer gathers sufficient data to steal someone\u2019s credentials, funds, or identity, that individual can lose funds (crypto or cash), access to personal accounts, and more.\u00a0\u00a0 Compromised businesses can experience such costly cyber incidents as network infiltration, data breaches, extortion and ransomware attacks.<\/p><p>Fortunately, there are many ways to prevent infostealers and similar threats from infiltrating our devices:<\/p><ul><li><strong>Get endpoint security:<\/strong> The easiest way to prevent most malware from making a mess of our systems is to install an endpoint security solution with real-time protection. <a href=\"https:\/\/www.eset.com\/us\/business\/solutions\/endpoint-protection\/\" target=\"_blank\" rel=\"noopener\">ESET Endpoint Security <\/a>or <a href=\"https:\/\/www.eset.com\/us\/home\/protection-plans\/\" target=\"_blank\" rel=\"noopener\">ESET Home Security<\/a> offer such a solution, thanks to multilayered <a href=\"https:\/\/www.eset.com\/us\/about\/technology\/\" target=\"_blank\" rel=\"noopener\">ESET LiveSense<\/a> technology that protects without hindering computer performance.<\/li><li><strong>Block:<\/strong> Another good practice is to block popups and ads in browsers, as they can sometimes lead to malware downloads. In addition, consider increasing your browser security and privacy settings, as these restrict how much data can flow between a website\/cookies and your in-browser activities\/PC. Alternatively, use a <a href=\"https:\/\/help.eset.com\/glossary\/en-US\/technology_secure_browser.html\" target=\"_blank\" rel=\"noopener\">secure browser<\/a> (such as the one contained in ESET security products) for safer banking and browsing.<\/li><li><strong>Update:<\/strong> Keep every device updated. Known vulnerabilities are still highly exploited, as people tend to leave their systems unpatched, leading to data breaches and <a href=\"https:\/\/www.theregister.com\/2024\/01\/12\/windows_phemedrone_stealer\/\" target=\"_blank\" rel=\"noopener\">data exfiltration<\/a>.<\/li><li><strong>Verify:<\/strong> Never click on random links or open any attachments that look suspicious, as these can harbor malware. Likewise, try not to download cracked or seemingly \u201cfree\u201d software, and opt to use legitimate marketplaces to prevent accidental infostealer attacks.<\/li><\/ul><\/div><div id=\"content-c11312197\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Lumma looms on the horizon<\/h3><\/header><p>Threats such as Lumma Stealer don\u2019t distinguish whether the user being victimized is a child, an adult, or a business; they just spread by diverse means and take whatever they can to further malicious agendas. While increasing your awareness of infostealers and how they work is a great first step toward decreasing the chance of a human error-induced compromise, the rising sophistication and presence of infostealers online make it wise to patch up any newly discovered security gaps before they invite bad actors.<\/p><p>So don\u2019t pass up on device security, and be mindful of risks in the digital world, as you can never know what you might encounter.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a1b0f4 elementor-widget elementor-widget-shortcode\" data-id=\"1a1b0f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18159\" class=\"elementor elementor-18159\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73b4cd0 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"73b4cd0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8d19c1e\" data-id=\"8d19c1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8865cce elementor-widget elementor-widget-text-editor\" data-id=\"8865cce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About ESET<\/strong><br \/>For 30 years, ESET\u00ae has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET\u2019s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24\/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&amp;D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single \u201cin-the-wild\u201d malware without interruption since 2003.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\u00a0 In their biannual ESET Threat Report, ESET researcher [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1305,40,61],"tags":[41,1077],"class_list":["post-102897","post","type-post","status-publish","format-standard","hentry","category-1305","category-eset","category-press-release","tag-eset","tag-1077"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Lumma Stealer: A fast-growing infostealer threat - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eset.com\/blog\/business\/lumma-stealer-a-fast-growing-infostealer-threat-1\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Lumma Stealer: A fast-growing infostealer threat - Version 2\" \/>\n<meta property=\"og:description\" content=\"\u00a0 In their biannual ESET Threat Report, ESET researcher [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eset.com\/blog\/business\/lumma-stealer-a-fast-growing-infostealer-threat-1\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-10T12:03:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Thumbnails_250x250\/lumma_thumbnail_sm.jpg\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/lumma-stealer-a-fast-growing-infostealer-threat-1\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/02\\\/lumma-stealer-a-fast-growing-infostealer-threat\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Lumma Stealer: A fast-growing infostealer threat\",\"datePublished\":\"2025-02-10T12:03:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/02\\\/lumma-stealer-a-fast-growing-infostealer-threat\\\/\"},\"wordCount\":1046,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/lumma-stealer-a-fast-growing-infostealer-threat-1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/INT\\\/OG_images\\\/Thumbnails_250x250\\\/lumma_thumbnail_sm.jpg\",\"keywords\":[\"ESET\",\"2025\"],\"articleSection\":[\"2025\",\"ESET\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/lumma-stealer-a-fast-growing-infostealer-threat-1\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/02\\\/lumma-stealer-a-fast-growing-infostealer-threat\\\/\",\"url\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/lumma-stealer-a-fast-growing-infostealer-threat-1\\\/\",\"name\":\"Lumma Stealer: A fast-growing infostealer threat - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/lumma-stealer-a-fast-growing-infostealer-threat-1\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/lumma-stealer-a-fast-growing-infostealer-threat-1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/INT\\\/OG_images\\\/Thumbnails_250x250\\\/lumma_thumbnail_sm.jpg\",\"datePublished\":\"2025-02-10T12:03:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/lumma-stealer-a-fast-growing-infostealer-threat-1\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/lumma-stealer-a-fast-growing-infostealer-threat-1\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/lumma-stealer-a-fast-growing-infostealer-threat-1\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/INT\\\/OG_images\\\/Thumbnails_250x250\\\/lumma_thumbnail_sm.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/INT\\\/OG_images\\\/Thumbnails_250x250\\\/lumma_thumbnail_sm.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/lumma-stealer-a-fast-growing-infostealer-threat-1\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Lumma Stealer: A fast-growing infostealer threat\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Lumma Stealer: A fast-growing infostealer threat - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eset.com\/blog\/business\/lumma-stealer-a-fast-growing-infostealer-threat-1\/","og_locale":"zh_HK","og_type":"article","og_title":"Lumma Stealer: A fast-growing infostealer threat - Version 2","og_description":"\u00a0 In their biannual ESET Threat Report, ESET researcher [&hellip;]","og_url":"https:\/\/www.eset.com\/blog\/business\/lumma-stealer-a-fast-growing-infostealer-threat-1\/","og_site_name":"Version 2","article_published_time":"2025-02-10T12:03:36+00:00","og_image":[{"url":"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Thumbnails_250x250\/lumma_thumbnail_sm.jpg","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"7 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eset.com\/blog\/business\/lumma-stealer-a-fast-growing-infostealer-threat-1\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2025\/02\/lumma-stealer-a-fast-growing-infostealer-threat\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Lumma Stealer: A fast-growing infostealer threat","datePublished":"2025-02-10T12:03:36+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2025\/02\/lumma-stealer-a-fast-growing-infostealer-threat\/"},"wordCount":1046,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.eset.com\/blog\/business\/lumma-stealer-a-fast-growing-infostealer-threat-1\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Thumbnails_250x250\/lumma_thumbnail_sm.jpg","keywords":["ESET","2025"],"articleSection":["2025","ESET","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.eset.com\/blog\/business\/lumma-stealer-a-fast-growing-infostealer-threat-1\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2025\/02\/lumma-stealer-a-fast-growing-infostealer-threat\/","url":"https:\/\/www.eset.com\/blog\/business\/lumma-stealer-a-fast-growing-infostealer-threat-1\/","name":"Lumma Stealer: A fast-growing infostealer threat - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eset.com\/blog\/business\/lumma-stealer-a-fast-growing-infostealer-threat-1\/#primaryimage"},"image":{"@id":"https:\/\/www.eset.com\/blog\/business\/lumma-stealer-a-fast-growing-infostealer-threat-1\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Thumbnails_250x250\/lumma_thumbnail_sm.jpg","datePublished":"2025-02-10T12:03:36+00:00","breadcrumb":{"@id":"https:\/\/www.eset.com\/blog\/business\/lumma-stealer-a-fast-growing-infostealer-threat-1\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eset.com\/blog\/business\/lumma-stealer-a-fast-growing-infostealer-threat-1\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/www.eset.com\/blog\/business\/lumma-stealer-a-fast-growing-infostealer-threat-1\/#primaryimage","url":"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Thumbnails_250x250\/lumma_thumbnail_sm.jpg","contentUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Thumbnails_250x250\/lumma_thumbnail_sm.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eset.com\/blog\/business\/lumma-stealer-a-fast-growing-infostealer-threat-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"Lumma Stealer: A fast-growing infostealer threat"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-qLD","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/102897","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=102897"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/102897\/revisions"}],"predecessor-version":[{"id":102901,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/102897\/revisions\/102901"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=102897"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=102897"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=102897"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}