Article Details
Scrape Timestamp (UTC): 2025-01-23 19:07:15.735
Original Article Text
Click to Toggle View
Hundreds of fake Reddit sites push Lumma Stealer malware. Hackers are distributing close to 1,000 web pages mimicking Reddit and the WeTransfer file sharing service that lead to downloading the Lumma Stealer malware. On the fake pages, the threat actor is abusing the Reddit brand by showing a fake discussion thread on a specific topic. The thread creator asks for help to download a specific tool, another user offers to help by uploading it to WeTransfer and sharing the link, and a third thanks him to make everything appear legitimate. Unsuspecting victims clicking on the link are taken to a fake WeTransfer site that mimicks the interface of the popular file-sharing service. The ‘Download’ button leads to the Lumma Stealer payload hosted on “weighcobbweo[.]top.” All sites used in this campaign contain a string of the brand they impersonate followed by random numbers and characters to appear legitimate at a quick glance. The top-level-domains are either “.org” or “.net.” All sites part of the campaign contain a string of the brand they impersonate followed by random numbers and characters to appear legitimate at a quick glance. The top-level-domains are either “.org” or “.net.” These fake websites were found by Sekoia researcher crep1x, who shared a complete list of web pages participating in the scheme. In total, there are 529 pages impersonating Reddit and 407 posing as the official WeTransfer service serving a download. The researcher told BleepingComputer that he was unable to retrieve any clues about the previous stages of the infection chain, but the specific topics used indicate some form of elaboration. The attack might begin with malvertising, SEO poisoning, malicious websites, direct messages on social media, and other means. A year ago, the same researcher discovered a similar campaign where 1,300 sites abused the AnyDesk brand to push the Vidar Stealer malware. Risk of info-stealer malware Lumma Stealer is a potent tool with advanced evasion and data theft mechanisms. The malware is sold to hackers who distribute it through various methods, including GitHub comments, deepfake nude generator sites, and malvertising. Info-stealing malware can collect, among other things, passwords stored on web browsers and session tokens that can be used to hijack accounts without knowing the credentials. This type of threat is commonly used to exfiltrate sensitive login data from companies and the details are usually sold on hacker forums. Most recently, infostealers enabled high-impact attacks on PowerSchool, HotTopic, CircleCI, and Snowflake.
Daily Brief Summary
Hackers have created nearly 1,000 fake web pages mimicking Reddit and WeTransfer to distribute Lumma Stealer malware.
These fraudulent sites feature counterfeit discussions and download links to trick users into downloading malware.
Unsuspecting individuals are directed to these fake websites where the 'Download' button installs the Lumma Stealer.
The URLs of these deceptive pages often combine a recognizable brand name with random characters to appear credible.
Sekoia researcher crep1x identified 529 pages impersonating Reddit and 407 for WeTransfer, detailing the extensive nature of the campaign.
Lumma Stealer, a potent infostealer, can capture passwords and session tokens, posing severe security risks.
The malware's distribution methods include malvertising, malicious websites, and direct messages on social media.
The stolen data is commonly sold on hacker forums, highlighting the critical threat to personal and organizational security.