Infostealer malware has been connected the emergence recently, and that's evident from the billions of idiosyncratic records leaked online successful the past twelvemonth alone. This benignant of malware targets everything from your name, telephone fig and code to fiscal details and cryptocurrency. Leading the complaint is the Lumma infostealer.
I person been reporting connected this malware since past year, and information researchers person called it 1 of the astir unsafe infostealers, infecting millions. There person been countless incidents of Lumma targeting people's idiosyncratic information (more connected this later), but the bully quality is that Microsoft has taken it down.
The Redmond-based institution announced it has dismantled the Lumma Stealer malware cognition with the assistance of instrumentality enforcement agencies astir the world.

Illustration of a hacker astatine work (Kurt "CyberGuy" Knutsson)
What you request to know
Microsoft confirmed that it has successfully taken down the Lumma Stealer malware web successful collaboration with instrumentality enforcement agencies astir the world. In a blog post, the institution revealed that its Digital Crimes Unit had tracked infections connected much than 394,000 Windows devices globally betwixt March 16 and May 16.
Lumma was a go-to instrumentality for cybercriminals, often utilized to siphon delicate accusation similar login credentials, recognition paper numbers, slope relationship details and cryptocurrency wallet data. The malware’s scope and interaction made it a favored prime among menace actors for fiscal theft and information breaches.
MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINS
To disrupt the malware’s operation, Microsoft obtained a tribunal bid from the U.S. District Court for the Northern District of Georgia, which allowed the institution to instrumentality down cardinal domains that supported Lumma’s infrastructure. This was followed by the U.S. Department of Justice stepping successful to prehend power of Lumma’s halfway bid strategy and unopen down marketplaces wherever the malware was being sold.
International practice played a large relation arsenic well. Japan’s cybercrime unit helped dismantle Lumma’s locally hosted infrastructure, portion Europol assisted successful actions against hundreds of domains utilized successful the operation. In total, implicit 1,300 domains were seized oregon redirected to Microsoft-managed sinkholes to forestall further damage.
Microsoft says this takedown effort besides included enactment from manufacture partners specified arsenic Cloudflare, Bitsight and Lumen, which helped dismantle the broader ecosystem that enabled Lumma to thrive.

HP laptop (Kurt "CyberGuy" Knutsson)
NEW MALWARE EXPLOITS FAKE UPDATES TO STEAL DATA
More astir the Lumma infostealer
Lumma is simply a Malware-as-a-Service (MaaS) that has been marketed and sold done underground forums since astatine slightest 2022. Over the years, its developers person released aggregate versions to continually amended its capabilities. I archetypal reported connected Lumma successful February 2024, erstwhile it was used by hackers to entree Google accounts utilizing expired cookies that contained login information.
Lumma continued targeting users, with reports successful October 2024 revealing it was impersonating fake quality verification pages to instrumentality Windows users into sharing delicate information. The malware wasn’t constricted to Windows. In January 2024, information researchers recovered the infostealer malware was targeting 100 cardinal Mac users, stealing browser credentials, cryptocurrency wallets and different idiosyncratic data.

Windows laptop (Kurt "CyberGuy" Knutsson)
HOW TO REMOVE MALWARE ON A PC (2025)
6 ways you tin support yourself from infostealer malware
To support yourself from the evolving menace of infostealer malware, which continues to people users done blase societal engineering tactics, see taking these six indispensable information measures:
1. Be skeptical of CAPTCHA prompts: Legitimate CAPTCHA tests ne'er necessitate you to property Windows + R, transcript commands oregon paste thing into PowerShell. If a website instructs you to bash this, it’s apt a scam. Close the leafage instantly and debar interacting with it.
2. Don’t click links from unverified emails and usage beardown antivirus software: Many infostealer attacks commencement with phishing emails that impersonate trusted services. Always verify the sender earlier clicking connected links. If an email seems urgent oregon unexpected, spell straight to the company’s authoritative website alternatively of clicking immoderate links wrong the email.
The champion mode to safeguard yourself from malicious links that instal malware, perchance accessing your backstage information, is to person beardown antivirus bundle installed connected each your devices. This extortion tin besides alert you to phishing emails and ransomware scams, keeping your idiosyncratic accusation and integer assets safe. Get my picks for the champion 2025 antivirus extortion winners for your Windows, Mac, Android and iOS devices.
3. Enable two-factor authentication: Enable two-factor authentication (2FA) whenever possible. This adds an other furniture of information by requiring a 2nd signifier of verification, specified arsenic a codification sent to your phone, successful summation to your password.
4. Keep devices updated: Regularly updating your operating system, browser and information software ensures you person the latest patches against known vulnerabilities. Cybercriminals exploit outdated systems, truthful enabling automatic updates is simply a elemental but effectual mode to enactment protected.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
5. Monitor your accounts for suspicious enactment and alteration your passwords: If you’ve interacted with a suspicious website, phishing email oregon fake login page, cheque your online accounts for immoderate antithetic activity. Look for unexpected login attempts, unauthorized password resets oregon fiscal transactions that you don’t recognize. If thing seems off, alteration your passwords instantly and study the enactment to the applicable work provider. Also, see utilizing a password manager to make and store analyzable passwords. Get much details astir my best expert-reviewed Password Managers of 2025 here.
6. Invest successful a idiosyncratic information removal service: Consider utilizing a work that monitors your idiosyncratic accusation and alerts you to imaginable breaches oregon unauthorized usage of your data. These services tin supply aboriginal informing signs of individuality theft oregon different malicious activities resulting from infostealer malware oregon akin attacks. While nary work promises to region each your information from the internet, having a removal work is large if you privation to perpetually show and automate the process of removing your accusation from hundreds of sites continuously implicit a longer play of time. Check retired my apical picks for information removal services here.
Get a free scan to find retired if your idiosyncratic accusation is already retired connected the web.
MALWARE STEALS BANK CARDS AND PASSWORDS FROM MILLIONS OF DEVICES
Kurt’s cardinal takeaway
Microsoft’s takedown of the Lumma Stealer malware web is simply a large triumph successful the combat against infostealers, which person fueled a surge successful information breaches implicit the past year. Lumma had go a go-to instrumentality for cybercriminals, targeting everything from browser credentials to crypto wallets crossed Windows and Mac systems. I’ve been tracking this malware since aboriginal 2024, and its quality to impersonate quality verification pages and maltreatment expired cookies made it particularly dangerous.
CLICK HERE TO GET THE FOX NEWS APP
Do you consciousness tech companies are doing capable to support users from malware similar this? Let america cognize by penning america at Cyberguy.com/Contact
For much of my tech tips and information alerts, subscribe to my escaped CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter
Ask Kurt a question oregon fto america cognize what stories you'd similar america to cover
Follow Kurt connected his societal channels
Answers to the astir asked CyberGuy questions:
- What is the champion mode to support your Mac, Windows, iPhone and Android devices from getting hacked?
- What is the champion mode to enactment private, unafraid and anonymous portion browsing the web?
- How tin I get escaped of robocalls with apps and information removal services?
- How bash I region my backstage information from the internet?
New from Kurt:
- Try CyberGuy's caller games (crosswords, connection searches, trivia, and more!)
- CyberGuy’s Exclusive Coupons and Deals
Copyright 2025 CyberGuy.com. All rights reserved.
Kurt "CyberGuy" Knutsson is an award-winning tech writer who has a heavy emotion of technology, cogwheel and gadgets that marque beingness amended with his contributions for Fox News & FOX Business opening mornings connected "FOX & Friends." Got a tech question? Get Kurt’s escaped CyberGuy Newsletter, stock your voice, a communicative thought oregon remark astatine CyberGuy.com.