Alerts
Events
DCR
Explore Cyware Products
Alerts
Events
DCR
Go to listing page
Unmasking Lumma Stealer: Analyzing Deceptive Tactics with Fake CAPTCHA
Malware and Vulnerabilities
October 23, 2024
Qualys
The malware's execution relies on legitimate tools like PowerShell and mshta.exe. Once the fake CAPTCHA is clicked, a Base64-encoded PowerShell script is copied to the clipboard, triggering the download of a stager file.
Read More
Lumma stealer
Fake Captcha
Malware-as-a-Service (MaaS)
Credential Theft
Browser Data
Publisher
Previous
“BannleEye” Exploit Allows Arbitrary Banning Users on B ...
Malware and Vulnerabilities
Next
VMware Releases vCenter Server Update to Fix Critical R ...
Malware and Vulnerabilities