{"id":18888,"date":"2024-01-09T18:02:55","date_gmt":"2024-01-09T18:02:55","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=18888"},"modified":"2024-04-15T17:01:13","modified_gmt":"2024-04-15T17:01:13","slug":"youtube-videos-cracks-lumma-stealer","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/youtube-videos-cracks-lumma-stealer\/","title":{"rendered":"YouTube Videos Promote Software Cracks With Lumma Stealer"},"content":{"rendered":"<p>Researchers have discovered a cybersecurity threat that targets users through YouTube videos. These videos <strong>offer pirated software but are being used to distribute malware<\/strong>, specifically Lumma stealer.<\/p>\n<h2>YouTube Videos Promoting Malware<\/h2>\n<p>Concerning a development in the cybersecurity world, <a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/lumma-variant-on-youtube\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">researchers have identified a new threat<\/a> targeting freeloaders via YouTube videos. These videos are seemingly harmless and <strong>offer cracked versions of popular software<\/strong>. But as it turns out, these videos <strong>distribute a potent malware<\/strong> known as Lumma Stealer.<\/p>\n<figure id=\"attachment_18905\" aria-describedby=\"caption-attachment-18905\" style=\"width: 1191px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/01\/youtube.webp\" alt=\"Video offering to download hacked Sony Vegas screenshot\" width=\"1191\" height=\"726\" class=\"size-full wp-image-18905\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/01\/youtube.webp 1191w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/01\/youtube-300x183.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/01\/youtube-1024x624.webp 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/01\/youtube-768x468.webp 768w\" sizes=\"auto, (max-width: 1191px) 100vw, 1191px\" \/><figcaption id=\"caption-attachment-18905\" class=\"wp-caption-text\">Video offering to download hacked Sony Vegas<\/figcaption><\/figure>\n<p>Besides being published some time ago, the video keeps gaining popularity. As researchers say, the file offered on the video <a href=\"https:\/\/gridinsoft.com\/blogs\/hacktool-win32-crack-analysis\/\">as a cracked program<\/a> is getting updated, meaning that hackers could have started spreading malicious payloads only <strong>after the video became popular<\/strong>. Also, such an approach opens the ability to spread effectively any malware, with Lumma being a firstling.<\/p>\n<h2>The Attack Chain<\/h2>\n<p>The attack begins innocently, with users searching for <a href=\"https:\/\/gridinsoft.com\/crack\">cracked versions of popular software<\/a> like Vegas Pro. A link in the video description tempts the user, <strong>leading to a bogus installer<\/strong> hosted on a service like MediaFire. But the real danger lies within. The unpacked ZIP installer contains <strong>a Windows shortcut masquerading as a setup file<\/strong>.<\/p>\n<p>In fact, the \u201csetup\u201d is a .lnk file <a href=\"https:\/\/gridinsoft.com\/blogs\/script-based-malware\/\">that runs a PowerShell script<\/a>. Then, things happen as in the textbook: <strong>the script downloads and runs the payload from a GitHub repository<\/strong>. The latter is chosen as a source for malware with firewall circumvention in mind.<\/p>\n<figure id=\"attachment_18935\" aria-describedby=\"caption-attachment-18935\" style=\"width: 790px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/01\/GS_BLOG_Illustrative-diagram-of-the-attack-process.webp\" alt=\"Illustrative diagram of the attack process image\" width=\"790\" height=\"510\" class=\"size-full wp-image-18935\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/01\/GS_BLOG_Illustrative-diagram-of-the-attack-process.webp 790w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/01\/GS_BLOG_Illustrative-diagram-of-the-attack-process-300x194.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/01\/GS_BLOG_Illustrative-diagram-of-the-attack-process-768x496.webp 768w\" sizes=\"auto, (max-width: 790px) 100vw, 790px\" \/><figcaption id=\"caption-attachment-18935\" class=\"wp-caption-text\">Illustrative diagram of the attack process<\/figcaption><\/figure>\n<h2>What is Lumma Stealer?<\/h2>\n<p><a href=\"https:\/\/gridinsoft.com\/spyware\/lumma-stealer\">Lumma Stealer<\/a> is an information-stealing malware written in C language. It has been available on Russian-speaking forums <strong>since August 2022 through a Malware-as-a-Service (MaaS) model<\/strong>. The threat actor behind this malware is believed to be &#8220;Shamel&#8221;, who operates under the alias &#8220;Lumma&#8221;. The primary targets of Lumma Stealer are <strong>cryptocurrency wallets and two-factor authentication (2FA) browser extensions<\/strong>.<\/p>\n<p>Once the malware infiltrates the victim&#8217;s machine, it steals sensitive information. It exfiltrates it to a C2 server via <strong>HTTP POST requests using the user agent &#8220;TeslaBrowser\/5.5&#8221;<\/strong>. Along with these features, the malware also has a non-resident loader capable of delivering additional payloads through <strong>EXE, DLL, and PowerShell<\/strong>.<\/p>\n<p>The Lumma Stealer has a starting price of <strong>$250 per month<\/strong> on underground forums. The lowest plan allows users to view and upload logs and access log analysis tools. On the other hand, the most expensive plan costs <strong>US$20,000 and gives users access to the source code<\/strong>. It also grants them the right to sell the infostealer.<\/p>\n<h2>How to stay protected?<\/h2>\n<p>First, we recommend that you refrain from downloading and using pirated software. This applies both <a href=\"https:\/\/gridinsoft.com\/blogs\/torrenting-is-it-legal\/\">to downloading from torrents<\/a> and other sources. <strong>It is illegal for both home users and especially corporations<\/strong> and the risks \u2013 well, you may see them above. Still, you can enhance your protection against malware like Lumma Stealer by following tips:<\/p>\n<ul>\n<li><strong>Avoid shady software spreading websites<\/strong>. Regardless of what kind of software they spread, the chance of getting infected by using one is noticeably higher. Seek a more reliable source \u2013 it will save you both time and money. To verify whether the site is legit and trustworthy, consider using <a href=\"https:\/\/gridinsoft.com\/online-virus-scanner#url\">GridinSoft Free Online Virus Checker<\/a>.<\/li>\n<li><strong>Don&#8217;t click on suspicious links<\/strong>. Similarly to the previous advice, be cautious with links, especially in emails, social media messages, or websites. Cybercriminals often rely on human curiosity to spread malware.<\/li>\n<li><strong>Use anti-malware protection<\/strong>. A reliable anti-malware program and ensure it&#8217;s always up-to-date. It can detect threats before they harm your system. GridinSoft Anti-Malware is a security solution you can rely on.<\/li>\n<\/ul>\n<p style=\"padding-top:15px;padding-bottom:15px;\"><a href=\"\/download\/antimalware\" rel=\"nofollow\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"\/blogs\/wp-content\/uploads\/2022\/07\/env01.webp\" alt=\"YouTube Videos Promote Software Cracks With Lumma Stealer\" width=\"798\" height=\"336\" class=\"aligncenter size-full\" title=\"\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers have discovered a cybersecurity threat that targets users through YouTube videos. These videos offer pirated software but are being used to distribute malware, specifically Lumma stealer. YouTube Videos Promoting Malware Concerning a development in the cybersecurity world, researchers have identified a new threat targeting freeloaders via YouTube videos. These videos are seemingly harmless and [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":18904,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[619,995,1360,218],"class_list":{"0":"post-18888","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-cybersecurity","9":"tag-piracy","10":"tag-stealer","11":"tag-youtube"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/01\/YouTube-Videos-Promoting-Cracked-Software-Spread-Lumma-Stealer.webp","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/18888","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=18888"}],"version-history":[{"count":18,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/18888\/revisions"}],"predecessor-version":[{"id":21346,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/18888\/revisions\/21346"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/18904"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=18888"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=18888"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=18888"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}