Malware

Lumma Stealer Spread By Reemergent Angry Likho APT

Privacy concept: pixelated words Malware on digital background, 3d render

High-profile organizations in Russia and Belarus have been mainly subjected to attacks with the Lumma Stealer malware conducted by the returning Angry Likho APT as part of a campaign that also targeted other countries, Hackread reports.

Angry Likho, also known as Sticky Werewolf, commenced intrusions against government agencies, contractors, and other major organizations with the delivery of spear-phishing emails with malicious RAR attachments that triggered compromise with Lumma Stealer. This facilitated the exfiltration of system data, software information, personal details, browser-stored data, and cryptocurrency wallets, according to an analysis from Kaspersky.

Additional findings revealed the deployment of Lumma Stealer through the novel FrameworkSurvivor.exe self-extracting archive developed with the Nullsoft Scriptable Install System. This development comes after Angry Likho was reported by Russian cybersecurity company F6 to have leveraged image files, new command servers, and more than 60 implants in its new attacks, indicating the APT's move toward increasingly covert operations.

Related Terms

Adware

You can skip this ad in 5 seconds

Cookies

This website uses cookies to improve your experience, provide social media features and deliver advertising offers that are relevant to you.

If you continue without changing your settings, you consent to our use of cookies in accordance with our privacy policy. You may disable cookies.