LummaStealer infections surge after CastleLoader malware campaigns
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。首先,我得仔细阅读文章,理解主要信息。 文章主要讲的是LummaStealer恶意软件的感染激增,利用ClickFix技术分发CastleLoader。LummaStealer是一个信息窃取器,作为MaaS平台运营,曾被执法部门破坏,但后来又恢复了活动。CastleLoader通过多种方式传播恶意软件,并且使用了复杂的混淆技术来隐藏自身。用户需要注意不要从不可信来源下载软件,并警惕PowerShell命令。 接下来,我需要将这些要点浓缩到100字以内。重点包括:感染激增、ClickFix技术、CastleLoader、信息窃取、防范建议。 现在组织语言,确保简洁明了。 </think> LummaStealer恶意软件感染激增,利用ClickFix技术分发CastleLoader恶意软件。该恶意软件窃取敏感数据,曾被执法部门破坏但已恢复活动。CastleLoader通过混淆技术和内存执行传播恶意软件。用户需避免从不可信来源下载软件并警惕PowerShell命令以防范威胁。 2026-2-11 17:15:17 Author: www.bleepingcomputer.com(查看原文) 阅读量:3 收藏

LummaStealer infections surge after CastleLoader malware campaigns

A surge in LummaStealer infections has been observed, driven by social engineering campaigns leveraging the ClickFix technique to deliver the CastleLoader malware.

LummaStealer, also known as LummaC2, is an infostealer operation running as a malware-as-a-service (MaaS) platform that was disrupted in May 2025 when multiple tech firms and law enforcement authorities seized 2,300 domains and the central command structure supporting the malicious service.

Infostealing malware targets various sensitive data that can range from credentials and cookies stored in web browsers, cryptocurrency wallet details, and documents to session cookies, authentication tokens, VPN configurations, and account data.

Wiz

Although the law enforcement operation severely disrupted the LummaStealer activity, the MaaS operation started to resume in July 2025.

A new report from cybersecurity company Bitdefender warns that LummaStealer operations have scaled significantly between December 2025 and January 2026, now being delivered through a malware loader called CastleLoader, and increasingly relying on ClickFix techniques.

"At the core of many of these campaigns is CastleLoader, which plays a central role in helping LummaStealer spread through delivery chains. Its modular, in-memory execution model, extensive obfuscation, and flexible command-and-control communication make it well-suited to malware distribution of this scale," Bitdefender researchers say.

CastleLoader emerged in early 2025 and has been distributing multiple families of infostealers and remote access trojans (Stealc, RedLine, Rhadamanthys, MonsterV2, CastleRAT, SectopRAT, NetSupport RAT, WarmCookie) through various methods, including ClickFix.

The malware loader is a heavily obfuscated script-based (AutoIT or Python) malware loader that decrypts, loads, and executes the LummaStealer payload entirely in memory.

It employs multiple obfuscation layers, including dictionary-based renaming of variables and functions, encoded strings decoded at runtime, large amounts of junk code and dead branches, and arithmetic and logic operations that resolve to trivial results.

Typical infection chain
Typical infection chain
Source: Bitdefender

Before executing LummaStealer, CastleLoader performs environment and sandbox checks to determine if it’s being analyzed, and adjusts file paths and persistence locations depending on which security products are detected on the host.

Persistence is achieved by copying the malicious AutoIT script to a persistence path, copying the interpreter to a separate location, and creating an internet shortcut file on Startup that launches the interpreter with the script as an argument.

Bitdefender found that CastleLoader deliberately initiates a failed DNS lookup for a non-existent domain, resulting in a DNS failure. The cybersecurity company says that artifacts from this network behavior can be used to detect CastleLoader activity.

In a report in November, researchers at Recorded Future's Insikt Group noted that a domain on CastleLoader's infrastructure acted as a command-and-control (C2) server for LummaStealer, indicating an early connection between the two operations.

Currently, LummaStealer is distributed via multiple channels, including trojanized software installers, pirated software downloaded from fake sites or torrents, and fake media or game archives in campaigns targeting countries all over the world.

Countries targeted in LummaStealer campaigns
Countries targeted in LummaStealer campaigns
Source: Bitdefender

According to the researchers, ClickFix is a "highly effective infection vector in LummaStealer campaigns." Users are served fake CAPTCHA or verification pages with detailed instructions to execute a malicious PowerShell command that had already been added to the clipboard.

The command ultimately retrieves a malicious script from the attacker's server and executes it on the local machine. The payload delivered this way was CastleLoader, which, in some cases, fetched and executed the LummaStealer info-stealing malware.

To defend against this threat, Bitdefender researchers recommend users avoid downloading and executing software or media (especially if the file has a .EXE extension) from  untrusted or unofficial sources.

Also, executing commands you don't understand in PowerShell or command-line utilities as part of a website's verification process is a red flag for malicious activity.

The general advice is to steer clear of pirated software (e.g., cracks, "unlocked" tools) and hide promoted results on Google Search by using an ad blocker.

tines

The future of IT infrastructure is here

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.


文章来源: https://www.bleepingcomputer.com/news/security/lummastealer-infections-surge-after-castleloader-malware-campaigns/
如有侵权请联系:admin#unsafe.sh