A new malware campaign that leverages fake CAPTCHA verification checks to deliver Lumma Stealer has been observed. This campaign has targeted victims from around the world (Argentina, Colombia, U.S., Philippines etc.) and across various industries (such as financial institutions, healthcare, marketing and telecom organizations). The attack chain begins with the victim visiting a compromised website that directs them to a fake CAPTCHA page with instructions. The site visitor is prompted to copy/paste a command into the Windows Run prompt to download and execute an HTA file from a remote server. Once the HTA file executes a PowerShell command launches to run additional scripts resulting in decoding and loading the Lumma Stealer payload. This malware is a potent tool with advanced evasion techniques and data theft mechanisms.
Symantec protects you from this threat, identified by the following:
Behavior-based
Carbon Black-based
Email-based
File-based
Machine Learning-based
Web-based
As Technovera Co., we officially partner with well-known vendors in the IT industry to provide solutions tailored to our customers’ needs. Technovera makes the purchase and guarantee of all these vendors, as well as the installation and configuration of the specified hardware and software.
We believe in providing technical IT solutions based on experience.