Close Menu
    Facebook LinkedIn YouTube WhatsApp X (Twitter) Pinterest
    Trending
    • BMW i7 all-solid-state battery tests begin in Munich
    • Feds Charge 16 Russians Allegedly Tied to Botnets Used in Ransomware, Cyberattacks, and Spying
    • VMware cloud partners demand “firm regulatory action” on Broadcom
    • Talk to Me, Amazon Shopping App: How AI Could Sort Through All the Products You’re Looking At
    • Bell Labs’ CMOS chip changed microprocessor design
    • What Statistics Can Tell Us About NBA Coaches
    • Anthropic’s new hybrid AI model can work on tasks autonomously for hours at a time
    • Newave offers modular surfboard with nine configurations
    Facebook LinkedIn WhatsApp
    Times FeaturedTimes Featured
    Thursday, May 22
    • Home
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    • More
      • AI
      • Robotics
      • Industries
      • Global
    Times FeaturedTimes Featured
    Home»News»Authorities carry out global takedown of infostealer used by cybercriminals
    News

    Authorities carry out global takedown of infostealer used by cybercriminals

    Editor Times FeaturedBy Editor Times FeaturedMay 22, 2025No Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp Copy Link

    “Based mostly on what we see, there may be a variety of cybercriminals admitting they’re utilizing Lumma, akin to actors concerned in bank card fraud, preliminary entry gross sales, cryptocurrency theft, and extra,” Kivilevich says.

    Amongst different instruments, the Scattered Spider hacking group—which has attacked Caesars Leisure, MGM Resorts Worldwide, and different victims—has been spotted using the Lumma stealer. In the meantime, in response to a report from TechCrunch, the Lumma malware was allegedly used within the build-up to the December 2024 hack of training tech agency PowerSchool, through which greater than 70 million records were stolen.

    “We’re now seeing infostealers not simply evolve technically, but additionally play a extra central position operationally,” says DoubleYou’s Wardle. “Even nation-state actors are creating and deploying them.”

    Ian Grey, director of study and analysis on the safety agency Flashpoint, says that whereas infostealers are just one software that cybercriminals will use, their prevalence might make it simpler for cybercriminals to cover their tracks. “Even superior menace actor teams are leveraging infostealer logs, or they threat burning subtle ways, methods, and procedures (TTPs),” Grey says.

    Lumma isn’t the primary infostealer to be focused by legislation enforcement. In October final 12 months, the Dutch Nationwide Police, together with worldwide companions, took down the infrastructure linked to the RedLine and MetaStealer malware, and the US Division of Justice unsealed costs in opposition to Maxim Rudometov, one of many alleged builders and directors of the RedLine infostealer.

    Regardless of the worldwide crackdown, infostealers have confirmed too helpful and efficient for attackers to desert. As Flashpoint’s Grey places it, “Even when the panorama in the end shifts as a result of evolution of defenses, the rising prominence of infostealers over the previous few years suggests they’re doubtless right here to remain for the foreseeable future. Utilization of them has exploded.”

    This story initially appeared at wired.com.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Editor Times Featured
    • Website

    Related Posts

    VMware cloud partners demand “firm regulatory action” on Broadcom

    May 22, 2025

    Apple legend Jony Ive takes control of OpenAI’s design future

    May 22, 2025

    “Microsoft has simply given us no other option,” Signal says as it blocks Windows Recall

    May 21, 2025

    Windows 11’s most important new feature is post-quantum cryptography. Here’s why.

    May 20, 2025

    Chicago Sun-Times prints summer reading list full of fake books

    May 20, 2025

    Hundreds of e-commerce sites hacked in supply-chain attack

    May 20, 2025
    Leave A Reply Cancel Reply

    Editors Picks

    BMW i7 all-solid-state battery tests begin in Munich

    May 22, 2025

    Feds Charge 16 Russians Allegedly Tied to Botnets Used in Ransomware, Cyberattacks, and Spying

    May 22, 2025

    VMware cloud partners demand “firm regulatory action” on Broadcom

    May 22, 2025

    Talk to Me, Amazon Shopping App: How AI Could Sort Through All the Products You’re Looking At

    May 22, 2025
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    About Us
    About Us

    Welcome to Times Featured, an AI-driven entrepreneurship growth engine that is transforming the future of work, bridging the digital divide and encouraging younger community inclusion in the 4th Industrial Revolution, and nurturing new market leaders.

    Empowering the growth of profiles, leaders, entrepreneurs businesses, and startups on international landscape.

    Asia-Middle East-Europe-North America-Australia-Africa

    Facebook LinkedIn WhatsApp
    Featured Picks

    AI-native workspace startup Tana raises €13.6 million to develop voice-powered workflow

    February 3, 2025

    Bill Gates Isn’t Like Those Other Tech Billionaires

    January 31, 2025

    The US Department of Defense is investing in deepfake detection

    December 7, 2024
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    Copyright © 2024 Timesfeatured.com IP Limited. All Rights.
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.