gtag('config', 'AW-10839537686');
top of page

Performanta's Safe XDR: Defending Against Lumma Stealer Malware

Writer's picture: Alex Maggioni  Alex Maggioni


A new malware campaign has emerged that uses fake CAPTCHA verification checks to deliver the infamous Lumma Stealer. This cunning attack method exploits human trust and familiarity with CAPTCHA challenges to bypass defenses and execute malicious payloads. Fortunately, our Safe XDR platform has successfully thwarted such attempts for our clients.


Anatomy of the Attack

The campaign’s attack chain begins when a victim visits a compromised website. In one particular case, one user visited a suspicious Indian restaurant site, which explicitly instructed the visitor to copy and paste a command into the “Run” command box ("Winkey+R").


The command leveraged the trusted mshta.exe binary—a legitimate Windows utility—to download and execute a malicious HTA file from a remote server. By abusing this trusted system tool, the attackers aimed to evade conventional detection mechanisms.



Real-World Impact

So far, five of our clients have experienced attempts related to this campaign. The attackers targeted the registry’s “RunMRU” key to establish persistence and execute commands. However, thanks to the advanced detection and response capabilities of Safe XDR, these attempts were blocked before any harm could occur.


The Role of Safe XDR in Mitigating Threats

Safe XDR identified and neutralized these threats in real time by:


  • Monitoring suspicious activity: Detecting abnormal use of mshta.exe and registry manipulation.

  • Proactive response: Automatically blocking and isolating malicious activity to prevent execution.

  • Comprehensive visibility: Providing detailed insights into the attack chain to inform proactive defense strategies.


Key Takeaways for Organizations

This campaign highlights the importance of a multi-layered approach to cybersecurity. Here’s how organizations can enhance their defenses:


  1. User Awareness: Educate employees about recognizing fake CAPTCHA pages and the dangers of executing unverified commands.

  2. Restrict Privileges: Limit user access to system utilities like mshta.exe to reduce the attack surface.

  3. Deploy Advanced Security Solutions: Adopt platforms like Safe XDR to detect and mitigate sophisticated threats in real time.

  4. Continuous Monitoring: Regularly audit systems for suspicious activity, such as unusual registry changes.


Find out more about how Performanta's Safe XDR can help your organization's security.

Comments


bottom of page