Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
CYBERDSA 2025 TO PUT MALAYSIA AT THE HEART OF REGIONAL CYBERSECURITY F...
Desilo to Launch “HARVEST™,” Encrypted Data Collaboration ...
Google tightens Android sideloading
The rise of digital wallets: What businesses in APAC need to know
Malvertising campaign targets Android users with advanced crypto-steal...
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      The rise of digital wallets: What businesses in APAC need to know

      The rise of digital wallets: What businesses in APAC need to know

      Tuesday, September 2, 2025, 1:59 PM Asia/Singapore | Features
    • Featured

      Resilience the true benchmark for smart infrastructure

      Resilience the true benchmark for smart infrastructure

      Wednesday, August 27, 2025, 8:21 PM Asia/Singapore | Features, IoT Security
    • Featured

      Deepfake a crisis of trust, not just technology

      Deepfake a crisis of trust, not just technology

      Tuesday, August 19, 2025, 10:06 AM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning

Select Page

Infostealer threat group shows resilience despite major takedown and taunts

By CybersecAsia editors | Wednesday, June 4, 2025, 3:48 PM Asia/Singapore

Infostealer threat group shows resilience despite major takedown and taunts

When law enforcement takedown campaigns never succeed in rooting out threat groups, the result is always increased and more brazen cybercrime.

After having 2,500 of their malicious domains taken down, the infostealer threat group Lumma has been showing signs of resurgence.

According to reports, the takedown operation had started on 15 May, when Lumma customers had flooded Dark Web forums complaining they were unable to access the malware’s command and control servers and management dashboards.

On 23 May the group had publicly confirmed that their main server was not seized due to its geographic location. However, it had been successfully infiltrated when enforcement agencies exploited an unknown vulnerability that had resulted in the server and its backups being wiped. The agencies had also created a phishing login page to the harvest credentials and digital footprints of Lumma customers. They had also planted a JavaScript snippet that tried to access the customers’ web cameras.

Down but not out
Since then, Lumma have already claimed to be operational once more. Several cybercriminals have announced claims that no one related to Lumma has been arrested, and that “everything has been restored, and we are working normally.”

In addition, several clues show:

  • The command-and-control servers registered in Russia had not been disabled, according to threat researchers from Check Point.
  • Information stolen from compromised computers continues to appear on the online market. For example, two days after the operation, stolen credentials obtained by Lumma had been put on sale. As of May 29, there had been a steady increase of credentials added for sale.
  • Data from Lumma-infected computers were still being sold by a centralized shop for the Russian market, after the takedown operation date.

As seen in Operation Cronos, which took down LockBit, law enforcement battling cybercrime often utilize psychological pressure against threat actors to sow distrust among them. The authorities had compromised LockBit’s leak site and planted a countdown timer teasing the disclosure of the identity of LockBit’s leader.

Share:

PreviousSurvey recaps well-known cybersecurity hurdles for Operational Technology industries
NextBusiness email compromise rackets still going strong, cybersecurity firm warns

Related Posts

A peek into the work day of hackers from various threat-group sizes

A peek into the work day of hackers from various threat-group sizes

Tuesday, May 2, 2023

Ghost accounts found peddling phishing templates on developer and other platforms

Ghost accounts found peddling phishing templates on developer and other platforms

Wednesday, July 31, 2024

Remote-working brings big new attack surfaces: Are companies ‘sassy’ enough?

Remote-working brings big new attack surfaces: Are companies ‘sassy’ enough?

Wednesday, March 18, 2020

Is your security solution defending or ignoring the DNS layer?

Is your security solution defending or ignoring the DNS layer?

Tuesday, June 6, 2023

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper
  • Mitigating Ransomware Risks with GRC Automation

    Mitigating Ransomware Risks with GRC Automation

    In today’s landscape, ransomware attacks pose significant threats to organizations of all sizes, with increasing …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • CISOs can navigate emerging risks from autonomous AI with a new security framework

    CISOs can navigate emerging risks from autonomous AI with a new security framework

    See how security leaders can adopt layered strategies addressing intent, governance, and oversight to manage …Read more
  • MoneyMe strengthens fraud prevention and credit decisioning

    MoneyMe strengthens fraud prevention and credit decisioning

    Australian fintech strengthens risk management with SEON to scale lending operations securely and efficiently.Read more
  • PT Kereta Api Indonesia announces nationwide email and communication overhaul

    PT Kereta Api Indonesia announces nationwide email and communication overhaul

    The state railway operator’s upgraded email system improves privacy, operational reliability, and regulatory alignment for …Read more
  • Operationalizing sustainability in cybersecurity: Group-IB’s approach

    Operationalizing sustainability in cybersecurity: Group-IB’s approach

    See how the firm turned malware-group takedowns into measurements of sustainability and resilience gains: by …Read more

Bottom sidebar

  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2025 CybersecAsia All Rights Reserved.