Hackers Abusing GitHub Infrastructure to Deliver Lumma Stealer
Cybersecurity researchers have uncovered a sophisticated campaign leveraging GitHub’s trusted release infrastructure to distribute the Lumma Stealer malware. This information-stealing malware, part of a growing trend of cybercriminals abusing legitimate platforms, poses significant risks by exfiltrating sensitive data and deploying additional malicious payloads. The attackers utilized GitHub repositories to host malicious files disguised as legitimate […] The post Hackers Abusing GitHub Infrastructure to Deliver Lumma Stealer appeared first on Cyber Security News.
Cybersecurity researchers have uncovered a sophisticated campaign leveraging GitHub’s trusted release infrastructure to distribute the Lumma Stealer malware.
This information-stealing malware, part of a growing trend of cybercriminals abusing legitimate platforms, poses significant risks by exfiltrating sensitive data and deploying additional malicious payloads.
The attackers utilized GitHub repositories to host malicious files disguised as legitimate software.
In one example, users were tricked into downloading files such as Pictore.exe
and App_aelGCY3g.exe
from GitHub-hosted URLs.
These files were signed with revoked certificates from ConsolHQ LTD and Verandah Green Limited, adding an initial layer of credibility before being flagged as malicious.
The URLs used for distribution included pre-signed links with parameters like X-Amz-Expires=300
, ensuring the download links remained active only for a short duration.
Analsysts at Trend Micro identified that this tactic limited detection opportunities while maintaining a sense of urgency for victims.
Malware Capabilities
Once executed, Lumma Stealer initiates several malicious activities:-
- Data Exfiltration: The malware targets credentials, cryptocurrency wallets, browser data (e.g., cookies, autofill information), and local system configurations. It communicates with command-and-control (C2) servers at IPs such as
192[.]142[.]10[.]246
and192[.]178[.]54[.]36
using HTTP POST requests. - Persistence Mechanisms: Lumma Stealer employs PowerShell scripts and shell commands to establish persistence. For instance:
powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit ExecutionPolicy Unrestricted -Command
This command allows unrestricted script execution while avoiding detection.
- Payload Deployment: The malware drops additional tools like SectopRAT and Vidar within temporary directories. These tools further compromise the system by stealing browser data or injecting processes.
- File Extraction: Using embedded utilities like
nsis7z.dll
, Lumma Stealer extracts files from archives such asapp-64.7z
.
The extracted files include components like chrome_100_percent.pak
and snapshot_blob.bin
, indicating potential use of Electron-based apps for malicious purposes.
The campaign aligns with tactics used by the Stargazer Goblin group, known for exploiting trusted platforms like GitHub and compromised websites for payload distribution.
The attackers demonstrated adaptability by combining multiple malware families—Lumma Stealer, SectopRAT, Vidar—into a modular attack framework.
To defend against threats like Lumma Stealer, always validate URLs and digital certificates before downloading files, and use endpoint security solutions to detect unauthorized shell commands.
Blocking communication with known malicious IPs enhances protection, while employee training helps identify phishing attempts.
Additionally, regularly patching systems and enabling MFA further strengthens security.
Indicators of Compromise
- File names:
Pictore.exe
,App_aelGCY3g.exe
- C2 IPs:
192[.]142[.]10[.]246
,84[.]200[.]24[.]26
- Shell commands:
cmd /c copy /b ..\Sen + ..\Silver + ..\Reprints t
This connects the files for staging data.
Collect Threat Intelligence with TI Lookup to Improve Your Company’s Security - Get 50 Free Request
The post Hackers Abusing GitHub Infrastructure to Deliver Lumma Stealer appeared first on Cyber Security News.