Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
APT threats: Prevention is better than cure
From insight to action: Securing APAC’s future with AI-driven cy...
Nexusguard Partners with DIMA to Provide Advanced DDoS Protection Serv...
Critical zero-day exploits dormant WinRAR vulnerability to target glob...
Survey finds 57% of respondents had experienced ransomware attacks in ...
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      From insight to action: Securing APAC’s future with AI-driven cybersecurity

      From insight to action: Securing APAC's future with AI-driven cybersecurity

      Wednesday, August 13, 2025, 10:07 AM Asia/Singapore | Features
    • Featured

      Experts weigh in on Singapore’s response to UNC3886

      Experts weigh in on Singapore’s response to UNC3886

      Friday, August 8, 2025, 10:45 PM Asia/Singapore | Features, Newsletter, Opinions
    • Featured

      When legitimate URLs lead to dangerous destinations

      When legitimate URLs lead to dangerous destinations

      Wednesday, August 6, 2025, 11:04 AM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning

Select Page

LOGIN REGISTER
  • Features
    • Featured

      From insight to action: Securing APAC’s future with AI-driven cybersecurity

      From insight to action: Securing APAC's future with AI-driven cybersecurity

      Wednesday, August 13, 2025, 10:07 AM Asia/Singapore | Features
    • Featured

      Experts weigh in on Singapore’s response to UNC3886

      Experts weigh in on Singapore’s response to UNC3886

      Friday, August 8, 2025, 10:45 PM Asia/Singapore | Features, Newsletter, Opinions
    • Featured

      When legitimate URLs lead to dangerous destinations

      When legitimate URLs lead to dangerous destinations

      Wednesday, August 6, 2025, 11:04 AM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning

Infostealer threat group shows resilience despite major takedown and taunts

By CybersecAsia editors | Wednesday, June 4, 2025, 3:48 PM Asia/Singapore

Infostealer threat group shows resilience despite major takedown and taunts

When law enforcement takedown campaigns never succeed in rooting out threat groups, the result is always increased and more brazen cybercrime.

After having 2,500 of their malicious domains taken down, the infostealer threat group Lumma has been showing signs of resurgence.

According to reports, the takedown operation had started on 15 May, when Lumma customers had flooded Dark Web forums complaining they were unable to access the malware’s command and control servers and management dashboards.

On 23 May the group had publicly confirmed that their main server was not seized due to its geographic location. However, it had been successfully infiltrated when enforcement agencies exploited an unknown vulnerability that had resulted in the server and its backups being wiped. The agencies had also created a phishing login page to the harvest credentials and digital footprints of Lumma customers. They had also planted a JavaScript snippet that tried to access the customers’ web cameras.

Down but not out
Since then, Lumma have already claimed to be operational once more. Several cybercriminals have announced claims that no one related to Lumma has been arrested, and that “everything has been restored, and we are working normally.”

In addition, several clues show:

  • The command-and-control servers registered in Russia had not been disabled, according to threat researchers from Check Point.
  • Information stolen from compromised computers continues to appear on the online market. For example, two days after the operation, stolen credentials obtained by Lumma had been put on sale. As of May 29, there had been a steady increase of credentials added for sale.
  • Data from Lumma-infected computers were still being sold by a centralized shop for the Russian market, after the takedown operation date.

As seen in Operation Cronos, which took down LockBit, law enforcement battling cybercrime often utilize psychological pressure against threat actors to sow distrust among them. The authorities had compromised LockBit’s leak site and planted a countdown timer teasing the disclosure of the identity of LockBit’s leader.

Share:

PreviousSurvey recaps well-known cybersecurity hurdles for Operational Technology industries
NextBusiness email compromise rackets still going strong, cybersecurity firm warns

Related Posts

Enhancing network protection remains a crucial corporate priority

Enhancing network protection remains a crucial corporate priority

Friday, January 24, 2025

Top phishing email subjects

Top phishing email subjects

Friday, January 22, 2021

Funding Societies adopts CNSP platform for simplified cloud security

Funding Societies adopts Cloud Native Security Platform (CNSP) for simplified cloud security

Tuesday, May 11, 2021

Despite the “crypto winter”, cybercriminals mining Monero are on the rise in Q3

Despite the “crypto winter”, cybercriminals mining Monero are on the rise in Q3

Monday, November 21, 2022

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper
  • Mitigating Ransomware Risks with GRC Automation

    Mitigating Ransomware Risks with GRC Automation

    In today’s landscape, ransomware attacks pose significant threats to organizations of all sizes, with increasing …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • PT Kereta Api Indonesia announces nationwide email and communication overhaul

    PT Kereta Api Indonesia announces nationwide email and communication overhaul

    The state railway operator’s upgraded email system improves privacy, operational reliability, and regulatory alignment for …Read more
  • Operationalizing sustainability in cybersecurity: Group-IB’s approach

    Operationalizing sustainability in cybersecurity: Group-IB’s approach

    See how the firm turned malware-group takedowns into measurements of sustainability and resilience gains: by …Read more
  • Thai government expands secure email management to close cybersecurity gaps

    Thai government expands secure email management to close cybersecurity gaps

    New measures address cybersecurity gaps in public sector communications, deploying advanced protections and operational support …Read more
  • How Iress optimized global DevSecOps

    How Iress optimized global DevSecOps

    Scaling compliance, security & efficiency – while seamlessly migrating to the cloud – with JFrog.Read more

Bottom sidebar

  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2025 CybersecAsia All Rights Reserved.