Lumma Stealer Strikes Again with Fake CAPTCHAs and Advanced Evasion

Amber | Attack Report
Download PDF

A new Lumma Stealer campaign has emerged, using fake CAPTCHAs, malvertising, and sophisticated payloads to target Windows users worldwide. The attackers employ deceptive tactics, including an infection chain that tricks victims into executing clipboard commands via the Windows Run prompt, effectively bypassing conventional defenses. Notably, one payload leverages code from an open-source tool to bypass the Windows Antimalware Scan Interface (AMSI), disabling malware protections and enabling the attackers to operate undetected within compromised systems.

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox

Cyber Horizons 2025

What Last Year’s Attacks Reveal About Today’s Risks

Watch the Webinar on-demand and get a FREE copy of our Cyber Horizons 2025 report.

Our Speakers
Speaker 1

Prateek Bhajanka Global Field CISO & Former Gartner Analyst Hive Pro Inc.

Speaker 2

Ankit Mani Manager Threat Intel HiveForce Labs

Speaker 3

Sreevani Tonipe Senior Threat Researcher HiveForce Labs