Microsoft takes off Lumma Crader Malware Network


The Windows 11 operating system logo is displayed on the laptop screen for a photo of the illustrations.

Beata Zawrzela Nurphoto | Getty images

Microsoft He said on Wednesday that it broke Lumma's crotch malware Project with the help of law enforcement officers around the world.

Giant technology said in Blog post The fact that the unit of digital crimes has discovered over 394,000 computers with Windows was infected by malicious Lumma software around the world between March 16 to May 16.

Microsoft said that Lumma malware was a favorite hacker tool used by bad actors. Hackers used malicious software for theft of passwords, credit cards, bank accounts and cryptocurrency portfolios.

Microsoft said that his Digital Crimes Unit was able to dismantle the internet domains underlying Lumma infrastructure using a court decision of the American District Court for the Northern Georgia district.

Then the US Department of Justice took control of Lumma's “central command structure” and was able to crush online markets in which bad actors bought malicious software.

The Cybercrime Control Center in Japan “has facilitated the suspension of Lumma's local infrastructure,” said the blog post.

“Working with law enforcement agencies and industry partners, we broke up communication between a malicious tool and victims,” ​​said Microsoft in the position. “In addition, over 1,300 domains confiscated or transferred to Microsoft, including 300 areas operating by law enforcement agencies, will be redirected to Microsoft Sinkholes.”

Hackers were to buy malicious Lumma software via Fort online since at least 2022, everything, while programmers “constantly improved their capabilities,” said a blog entry. Malware software has become a “tool for cyber criminals and online threat entities” because it is easy to spread and break the security defense with appropriate programming, said the company.

These are the latest news. Refresh updates.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *