Close Menu
maincoin.money
    What's Hot

    Ethereum and Pepe Dollar (PEPD) Recognized as Leading Cryptocurrencies to Invest in This Cycle; Ethereum Investors Increasingly Purchase Pepe Dollar

    August 21, 2025

    Bitcoin Bull Market Depends on $13.8 Billion Options Expiration

    August 21, 2025

    VERB, TON Treasury Company, Reveals Assets Exceeding $780 Million

    August 21, 2025
    Facebook X (Twitter) Instagram
    maincoin.money
    • Home
    • Altcoins
    • Markets
    • Bitcoin
    • Blockchain
    • DeFi
    • Ethereum
    • NFTs
      • Regulation
    Facebook X (Twitter) Instagram
    maincoin.money
    Home»Altcoins»How Hackers Are Using Fake Captchas to Spread Lumma Stealer Malware
    Altcoins

    How Hackers Are Using Fake Captchas to Spread Lumma Stealer Malware

    Ethan CarterBy Ethan CarterAugust 18, 2025No Comments4 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Decrypt logo
    Share
    Facebook Twitter LinkedIn Pinterest Email

    In brief

    • Hackers are using fake Captchas to distribute Lumma Stealer malware, new research has found.
    • Once installed by an unsuspecting user, the malware searches infected devices for credentials, including crypto wallet data.
    • Lumma Stealer is an example of Malware-as-a-Service, which is effectively run as a “sustainable cybercriminal business,” experts told Decrypt.

    Bad actors are using fake Captcha prompts to distribute fileless Lumma Stealer malware that can steal crypto wallet credentials, according to research from cybersecurity firm DNSFilter.

    First detected on a Greek banking website, the prompt requests Windows users to copy and paste it into the Run dialog box, and then to press Enter.

    DNSFilter reports that the firm’s clients interacted with the fake Captcha 23 times over the course of three days, and that 17% of the people who encountered the prompt completed its on-screen steps, resulting in the attempted delivery of malware.

    The malware in question is Lumma Stealer, which according to DNSFilter’s Global Partner Evangelist, Mikey Pruitt, searches an infected device for credentials and other sensitive data.

    “Lumma Stealer immediately sweeps the system for anything it can monetize—browser-stored passwords and cookies, saved 2FA tokens, cryptocurrency wallet data, remote-access credentials, and even password-manager vaults,” he told Decrypt.

    Pruitt clarifies that the bad actors use lifted data for a variety of purposes that all usually boil down to monetary gain, such as ID theft and accessing “online accounts for financial theft or fraudulent transactions,” as well as gaining access to cryptocurrency wallets.

    Lumma Stealer has a wide reach according to Pruitt, and can be found on a wide variety of websites.

    “While we can’t speak to how much might have been lost through this one avenue, this threat can exist on non-malicious sites,” he explained. “This makes it incredibly dangerous and important to be aware of when things seem suspicious.”

    Malware-as-a-Service

    Lumma Stealer is not only malware, but an example of Malware-as-a-Service (MaaS). Security firms have reported it’s responsible for a rise in malware attacks in recent years.

    According to ESET malware analyst Jakub Tomanek, the operators behind Lumma Stealer develop its features, refine its ability to evade malware detection, while also registering domains to host the malware.

    “Their primary goal is to keep the service operational and profitable, collecting monthly subscription fees from affiliates—effectively running Lumma Stealer as a sustainable cybercriminal business,” he told Decrypt.

    Because it spares cybercriminals the need to develop malware and any underlying infrastructure, MaaS such as Lumma Stealer has proven stubbornly popular.

    In May, the U.S. Department of Justice seized five internet domains that bad actors were using to operate Lumma Stealer malware, while Microsoft privately took down 2,300 similar domains.

    Yet reports have revealed that Lumma Stealer has reemerged since May, with a July analysis from Trend Micro showing that “the number of targeted accounts steadily returned to their usual levels” between June and July.

    Part of the appeal of Lumma Stealer is that subscriptions, which are often monthly, are inexpensive relative to the potential gains to be made.

    “Available on dark web forums for as little as $250, this sophisticated information stealer specifically targets what matters most to cybercriminals – cryptocurrency wallets, browser-stored credentials, and two-factor authentication systems,” said Nathaniel Jones , the VP of Security & AI Strategy at Darktrace.

    Jones told Decrypt that the scale of Lumma Stealer exploits has been “alarming,” with 2023 witnessing estimated losses of $36.5 million, as well as 400,000 Windows devices infected in the space of two months.

    “But the real concern isn’t just the numbers – it’s the multi-layered monetisation strategy,” he said. “Lumma doesn’t just steal data, it systematically harvests browser histories, system information, and even AnyDesk configuration files before exfiltrating everything to Russian-controlled command centres.”

    Heightening the threat of Lumma Stealer is the fact that stolen data is often fed directly into “traffer teams,” that specialize the theft and resale of credentials

    “This creates a devastating cascade effect where a single infection can lead to bank account hijacking, cryptocurrency theft, and identity fraud that persists long after the initial breach,” add Jones.

    While Darktrace suggests a Russian origin or center for Lumma-related exploits, DNSFilter notes that the bad actors making use of the malware service could be operating from multiple territories.

    Mikey Pruitt said, “It is common for such malicious activities to involve individuals or groups from multiple countries, especially with the use of international hosting providers and malware distribution platforms.”

    Daily Debrief Newsletter

    Start every day with the top news stories right now, plus original features, a podcast, videos and more.

    Captchas Fake Hackers Lumma Malware Spread Stealer
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Avatar photo
    Ethan Carter

      Ethan is a seasoned cryptocurrency writer with extensive experience contributing to leading U.S.-based blockchain and fintech publications. His work blends in-depth market analysis with accessible explanations, making complex crypto topics understandable for a broad audience. Over the years, he has covered Bitcoin, Ethereum, DeFi, NFTs, and emerging blockchain trends, always with a focus on accuracy and insight. Ethan's articles have appeared on major crypto portals, where his expertise in market trends and investment strategies has earned him a loyal readership.

      Related Posts

      How Indices Will Impact Crypto Like the S&P 500 Did for Stocks

      August 21, 2025

      Kanye Unveils New Token, BNB Reaches All-Time High, China Explores Stablecoin Options

      August 21, 2025

      XRP Pattern Suggests Q4 Surge as Whales Prepare to Reaccumulate

      August 21, 2025
      Regulation

      Ethereum and Pepe Dollar (PEPD) Recognized as Leading Cryptocurrencies to Invest in This Cycle; Ethereum Investors Increasingly Purchase Pepe Dollar

      By Ethan CarterAugust 21, 20250

      This material is sponsored. PRESS RELEASE. Ethereum remains at the forefront of the crypto market,…

      Markets

      Bitcoin Bull Market Depends on $13.8 Billion Options Expiration

      By Ethan CarterAugust 21, 20250

      Key insights:Bitcoin bears retain strong motivations below $114,000, likely amplifying pressure prior to options expiry.Concerns…

      Blockchain

      VERB, TON Treasury Company, Reveals Assets Exceeding $780 Million

      By Ethan CarterAugust 21, 20250

      VERB Technology Company, which focuses on acquisitions in Toncoin (TON), announced it has amassed approximately…

      Bitcoin

      OCC References ‘Safety and Stability’ in Revoking Anchorage Crypto Bank’s Consent Order

      By Ethan CarterAugust 21, 20250

      Here’s the rewritten content while preserving the HTML tags: Summary The OCC has revoked its…

      Recent Posts
      • Ethereum and Pepe Dollar (PEPD) Recognized as Leading Cryptocurrencies to Invest in This Cycle; Ethereum Investors Increasingly Purchase Pepe Dollar
      • Bitcoin Bull Market Depends on $13.8 Billion Options Expiration
      • VERB, TON Treasury Company, Reveals Assets Exceeding $780 Million
      • OCC References ‘Safety and Stability’ in Revoking Anchorage Crypto Bank’s Consent Order
      • How Indices Will Impact Crypto Like the S&P 500 Did for Stocks

      At MainCoin.Money, we cover everything from Bitcoin and Ethereum to the latest trends in Altcoins, DeFi, NFTs, blockchain technology, market movements, and global crypto regulations.

      Whether you’re a seasoned investor, a blockchain developer, or just curious about digital assets, our mission is to make crypto news accessible and reliable for everyone.

      Facebook X (Twitter) Instagram Pinterest YouTube
      Top Insights

      Ethereum and Pepe Dollar (PEPD) Recognized as Leading Cryptocurrencies to Invest in This Cycle; Ethereum Investors Increasingly Purchase Pepe Dollar

      August 21, 2025

      Bitcoin Bull Market Depends on $13.8 Billion Options Expiration

      August 21, 2025

      VERB, TON Treasury Company, Reveals Assets Exceeding $780 Million

      August 21, 2025
      Get Informed

      Subscribe to Updates

      Get the latest creative news from FooBar about art, design and business.

      Facebook X (Twitter) Instagram Pinterest
      • About Us
      • Contact us
      • Privacy Policy
      • Disclaimer
      • Terms and Conditions
      © 2025 maincoin.money. All rights reserved.

      Type above and press Enter to search. Press Esc to cancel.