Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
Data protection challenges in the agentic workspace
Bitsight Reports 50% Growth in APAC Amid Rising Demand for Cyber Risk ...
Critical Zero Day web application firewall vulnerability enables remot...
Major internet infrastructure outage disrupts access to numerous popul...
What happened with Cloudflare?
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      What happened with Cloudflare?

      What happened with Cloudflare?

      Wednesday, November 19, 2025, 11:35 AM Asia/Singapore | Features
    • Featured

      High stakes in the cybersecurity AI arms race

      High stakes in the cybersecurity AI arms race

      Tuesday, November 18, 2025, 10:05 AM Asia/Singapore | Features
    • Featured

      Staying resilient against the invisible onslaught of AI-powered attacks

      Staying resilient against the invisible onslaught of AI-powered attacks

      Tuesday, November 11, 2025, 11:27 AM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning

Select Page

Infostealer threat group shows resilience despite major takedown and taunts

By CybersecAsia editors | Wednesday, June 4, 2025, 3:48 PM Asia/Singapore

Infostealer threat group shows resilience despite major takedown and taunts

When law enforcement takedown campaigns never succeed in rooting out threat groups, the result is always increased and more brazen cybercrime.

After having 2,500 of their malicious domains taken down, the infostealer threat group Lumma has been showing signs of resurgence.

According to reports, the takedown operation had started on 15 May, when Lumma customers had flooded Dark Web forums complaining they were unable to access the malware’s command and control servers and management dashboards.

On 23 May the group had publicly confirmed that their main server was not seized due to its geographic location. However, it had been successfully infiltrated when enforcement agencies exploited an unknown vulnerability that had resulted in the server and its backups being wiped. The agencies had also created a phishing login page to the harvest credentials and digital footprints of Lumma customers. They had also planted a JavaScript snippet that tried to access the customers’ web cameras.

Down but not out
Since then, Lumma have already claimed to be operational once more. Several cybercriminals have announced claims that no one related to Lumma has been arrested, and that “everything has been restored, and we are working normally.”

In addition, several clues show:

  • The command-and-control servers registered in Russia had not been disabled, according to threat researchers from Check Point.
  • Information stolen from compromised computers continues to appear on the online market. For example, two days after the operation, stolen credentials obtained by Lumma had been put on sale. As of May 29, there had been a steady increase of credentials added for sale.
  • Data from Lumma-infected computers were still being sold by a centralized shop for the Russian market, after the takedown operation date.

As seen in Operation Cronos, which took down LockBit, law enforcement battling cybercrime often utilize psychological pressure against threat actors to sow distrust among them. The authorities had compromised LockBit’s leak site and planted a countdown timer teasing the disclosure of the identity of LockBit’s leader.

Share:

PreviousSurvey recaps well-known cybersecurity hurdles for Operational Technology industries
NextBusiness email compromise rackets still going strong, cybersecurity firm warns

Related Posts

Guess what the #1 insider threat to Cloud security is …

Guess what the #1 insider threat to Cloud security is …

Monday, April 13, 2020

AI is causing identity management crises, and it is also the cure

AI is causing identity management crises, and it is also the cure

Tuesday, August 13, 2024

CISOs can navigate emerging risks from autonomous AI with a new security framework

CISOs can navigate emerging risks from autonomous AI with a new security framework

Tuesday, August 26, 2025

Hackers love the Cloud and open source tools: report

Hackers love the Cloud and open source tools: report

Wednesday, March 3, 2021

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper
  • Mitigating Ransomware Risks with GRC Automation

    Mitigating Ransomware Risks with GRC Automation

    In today’s landscape, ransomware attacks pose significant threats to organizations of all sizes, with increasing …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • Meeting the business resilience challenges of digital transformation

    Meeting the business resilience challenges of digital transformation

    Data proves to be key to driving secure and sustainable digital transformation in Southeast Asia.Read more
  • Upgrading biometric authentication system protects customers in the Philippines: UnionDigital Bank

    Upgrading biometric authentication system protects customers in the Philippines: UnionDigital Bank

    An improved dual-liveness biometric framework can counter more deepfake threats, ensure compliance, and protect underbanked …Read more
  • HOSTWAY gains 73% operational efficiency for private cloud operations  

    HOSTWAY gains 73% operational efficiency for private cloud operations  

    With NetApp storage solutions, the Korean managed cloud service provider offers a lean, intelligent architecture, …Read more
  • CISOs can navigate emerging risks from autonomous AI with a new security framework

    CISOs can navigate emerging risks from autonomous AI with a new security framework

    See how security leaders can adopt layered strategies addressing intent, governance, and oversight to manage …Read more

Bottom sidebar

  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2025 CybersecAsia All Rights Reserved.