Attacks involved the utilization of Amazon S3 bucket and Content Delivery Network-hosted sites spoofing Google CAPTCHA pages and other verification sites, which include instructions that trigger a malicious PowerShell command downloading Lumma Stealer and proceeding with the exfiltration of sensitive device data.

Article Link: Lumma Stealer deployed via fraudulent CAPTCHA pages | SC Media

1 post – 1 participant

Read full topic

​Attacks involved the utilization of Amazon S3 bucket and Content Delivery Network-hosted sites spoofing Google CAPTCHA pages and other verification sites, which include instructions that trigger a malicious PowerShell command downloading Lumma Stealer and proceeding with the exfiltration of sensitive device data.
Article Link: Lumma Stealer deployed via fraudulent CAPTCHA pages | SC Media
1 post – 1 participant
Read full topic