Resources

Understanding Infostealers: Delivery Methods, Impact, and Detection Challenges

Written by Collins Chua | Feb 17, 2025 9:41:25 AM

The rise of infostealer malware has fueled a wave of cybercrime, with businesses facing escalating risks from stolen credentials, unauthorised access, and data leaks. Threat actors are no longer just targeting large enterprises—organisations across industries are now in the crosshairs of sophisticated malware campaigns.

Among the most active threats today is Lumma Stealer, a Malware-as-a-Service (MaaS) strain that allows attackers to harvest login credentials, financial data, and system information at scale. This blog delves into how Lumma Stealer campaigns are executed, the techniques used to evade detection, and critical security measures to mitigate the risk of compromise.

The surge in Infostealer campaigns has particularly affected organisations in the EMEA region, with an increase of up to 58% according to Checkpoint. In 2024, these campaigns led to the infection of over 18 million devices, resulting in the exposure and sale of over 2.4 billion compromised credentials.

Lumma Stealer Campaign

Lumma Stealer is a type of information-stealing malware offered through a Malware-as-a-Service (MaaS) platform. It targets Windows systems and is capable of stealing browser information, including credentials, cookies, autofill data, and browser extension data such as cryptocurrency wallets. Additionally, it collects .txt files from the user’s desktop and extracts data from programs like AnyDesk, FileZilla, KeePass, and Telegram. Written in C++, Lumma Stealer was first identified in September 2022. Threat actors have used logs from Lumma Stealer infections to gain initial access and deploy Cloak ransomware. Initial Access Brokers (IAB) then sell these credentials in underground marketplaces, fueling a range of cyberattacks such as ransomware and fraud.

Malware Campaign and Initial Access

The ongoing Lumma Stealer campaign uses malicious LNK (shortcut) files disguised as legitimate PDF documents. These LNK files initiate a multi-stage infection process, leading to the deployment of Lumma Stealer on the victim's machine. The campaign targets multiple industries, including:

  • Education & Academia
  • Corporate & Business
  • Government & Legal
  • Healthcare & Pharmaceuticals
  • Financial & Banking
  • Engineering & Manufacturing
  • Technology & Blockchain
  • Media & Journalism

Initial Access Method

Initial access is commonly achieved through drive-by compromises using malicious WebDAV servers while users unknowingly visit infected websites.

Execution and Exfiltration Process

When the malicious LNK file, masked as a PDF, is executed, it downloads and runs further payloads.

http://x.x.x.x/Downloads/254-zebar-school-for-children-thaltej-pro-order-abad-rural.pdf.lnk”

The malicious file weaponises legitimate executables like mshta.exe to run HTML application files (HTA), which then execute PowerShell commands that connect back to the command and control (C2) server. The final PowerShell script downloads and executes the infostealer “Kompass-4.1.2.exe” (Lumma Stealer).

Detection Method

Infostealers often use Domain Generation Algorithms (DGAs) to facilitate communication with C2 servers. Detecting DGAs can be achieved by calculating the Shannon entropy of domain names to identify randomness. Here are two query examples for detecting DGA and DNS Fast Flux attacks:

  1. Query for analysing numerous requests to non-existent domains:

Plain Text

Plain Text

Plain Text

| tstats c(query) as cc dc(query) as dcc values(query) as query where index="main" sourcetype="*dns*" query!="*in-addr*" query!="*.*.*.*" query!="*arpa*" query="*.*.*" query!="www*" query!="*.local" query!="*.main" query!="*.corp" query!="*.com" rcode_name=NXDOMAIN id.orig_h IN (10*,192.168*,172*) by id.orig_h _time span=8h | where dcc>=200 | eval query=mvfilter(match(query,"^([a-zA-Z0-9]+)\.([a-zA-Z0-9]+)\.([a-zA-Z0-9]+)$")) | where mvcount(query)>=1000 | fields - dcc cc

 

  1. Query for detecting DNS Fast Flux attacks:

 

Plain Text

Plain Text

Plain Text

| tstats dc(answers{}) as num_ips where index="main" sourcetype="*dns*" answers{}=* AA=true rejected=false (qtype_name=AAAA OR qtype_name=NS) by query _time span=1h | where num_ips>=100 and !isnull(query)

 

MITRE ATT&CK Tactics and Techniques:

Tactic Technique
Execution (TA0002) T1059 – Command and Scripting Interpreter: PowerShell
  T1204.002 – User Execution: Malicious File
  T1047 – Windows Management Instrumentation (WMI)
Persistence (TA0003) T1547.001 – Registry Run Keys / Startup Folder
Privilege Escalation (TA0004) T1218.011 – System Binary Proxy Execution: Rundll32
Defense Evasion (TA0005) T1027 – Obfuscated Files or Information
  T1036.003 – Masquerading: Rename System Utilities
  T1564.003 – Hide Artifacts: Hidden Window
Credential Access (TA0006) T1012 – Query Registry
Discovery (TA0007) T1082 – System Information Discovery
Lateral Movement (TA0008) T1021.002 – Remote Services: SMB/Windows Admin Shares
Collection (TA0009) T1114 – Email Collection
  T1560 – Archive Collected Data
Command and Control (TA0011) T1071 – Application Layer Protocol
Exfiltration (TA0010) T1041 – Exfiltration Over C2 Channel
Impact (TA0040) T1489 – Service Stop
  T1490 – Inhibit System Recovery

 

Recommendations for Monitoring Infostealer Infections

  • Regular scanning: Conduct regular scans and threat hunt activities on corporate systems to ensure early detection and mitigation of infostealer infections. Implement a comprehensive routine to promptly address any potential threats.
  • Track anomalous DNS Queries: Monitor anomalous DNS Queries as threat actors may use infostealers as an initial vector to access network or cloud infrastructure. This helps detect unusual activities that may indicate a breach.
  • Use real-time dashboards: Integrate logs into SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response) solutions to detect potential attacks in real time. Real-time dashboards provide visibility into your network, allowing swift response to any suspicious activity.

Stay Ahead with Proactive Security Measures

Malware strains like Lumma Stealer don’t just steal credentials—they act as gateways to larger cyber threats, including ransomware and network intrusions. Without proactive monitoring and advanced security controls, businesses risk financial losses, reputational damage, and regulatory consequences.

Organisations can help mitigate these risks by leveraging managed security services that provide continuous threat intelligence, incident response, and proactive vulnerability management. At CybaVerse, our Threat Detection & Response Services help businesses identify, analyse, and contain threats before they escalate.