Fake Cloudflare Verification Results in LummaStealer Trojan Infections
March 20, 2025, 9:13 a.m.
Description
A malicious campaign targeting Windows users through WordPress websites is deploying the LummaStealer trojan. Attackers use fake Cloudflare verification prompts to trick users into running malicious PowerShell commands. The infection is spread through compromised plugins or injected JavaScript in legitimate files. Victims are directed to execute commands that download and install the LummaStealer malware, which can steal sensitive data like login credentials and cryptocurrency information. The attackers also create hidden admin users in infected WordPress sites for persistence. Multiple variants of this attack have been observed, with some using URL shortening services to obfuscate malicious links. Website owners are advised to keep software updated, use strong passwords, and implement 2FA to mitigate risks.
Tags
Date
- Created: March 20, 2025, 4:39 a.m.
- Published: March 20, 2025, 4:39 a.m.
- Modified: March 20, 2025, 9:13 a.m.
Indicators
- https://warther.info/collect.php
- warther.info
- seoranker.info
- bestieslos.com
Attack Patterns
- LummaStealer
- LummaC2
- T1078.004
- T1102.001
- T1059.001
- T1547.001
- T1087
- T1056.001
- T1555
- T1204.002
- T1140
- T1027