• My Account
  • Shop
  • Cart

Cyber Bunee

  • Home
  • News
    • artificial intelligence
    • cyber-security
    • hacking attacks
    • software dev
    • automation
    • certifications
    • Videos
      • Youtube Videos
    • Resources

    “Lumma Stealer Update: Harnessing Trigonometry to Evade Cybersecurity Detection”

    bunee 20 Nov 2023

    Lumma Stealer Update: Evading Detection with Trigonometry

    Main Points from the Article:

    • LummaC2, popularly known as Lumma Stealer, has been updated with an ingenious anti-sandbox technique that employs trigonometry principles.
    • The updated technique is crafted to postpone the malware’s activation until it detects human mouse activity.
    • Alberto Marín, a security researcher at Outpost24, has elucidated the technique’s mechanics.

    Trigonometry: No Longer Just for your Math Homework

    High school math concepts have graduated from your old textbooks and migrated to the world of tech maladies. The malicious malware known as LummaC2, also referred to as Lumma Stealer, has gotten a bit of a brain transplant. Not to increase its IQ, but to amp up its stealth mode. It’s now equipped with a trigonometry-based anti-sandbox technique that allows it to slyly evade detection while it exfiltrates valuable data from host systems.

    Delays and Detonations: A Malware’s Game of Mouse and Cat

    Ever played hide-and-seek with a piece of malware? Well the Lumma Stealer does that, but on a whole other level. The devious little software doesn’t just hide in the shadows; it waits! How patiently? Until it detects human mouse activity! This “delayed detonation” technique allows Lumma Stealer to stay incognito, making it much harder for antivirus software to expose it. It’s like an introverted party-crasher – it only gets lively when it detects some real human fun.

    Alberto Marín: Unmasking the Masquerade

    Our very own Sherlock Holmes in this mystery saga is Alberto Marín, a security researcher with Outpost24. He’s shed some light on how this shadowy figure, the Lumma Stealer, applies trigonometry principles to evade detection. According to him, the malware is queuing up a whole lot of trig homework to confuse the cyber defense mechanisms, all while it steals your data. The cool kids call it the “Mathematical Heist.”

    Summary in a Nutshell

    All in all, it seems like LummaC2 or Lumma Stealer is getting craftier with its evasion techniques. By utilizing trigonometry, it’s not only expanding its capabilities but also showcasing that malicious software can cross academic boundaries when it comes to causing havoc. So cheer up folks, the world where malware studied harder than us has already arrived.



    Original Article: https://thehackernews.com/2023/11/lummac2-malware-deploys-new.html




    2023-11-20
    Facebook Twitter linkedin Pinterest WhatsAppt Telegram Email More
    Previous Article :

    Navigating the Digital Threat Landscape: A Comprehensive Guide for Cybersecurity Leaders

    Next Article :

    Unmasking Phishing Techniques: The Return of QakBot through DarkGate and PikaBot Malware

    Similiar

    Unmasking Fraudulent Loan Apps: A Deep Dive into the Dark Side of the Google Play Store

    Unmasking Fraudulent Loan Apps: A Deep Dive into the Dark Side of the Google Play Store

    Unraveling PoolParty: Sneaky New Process Injection Techniques Capable of Crashing Windows Systems

    Unraveling PoolParty: Sneaky New Process Injection Techniques Capable of Crashing Windows Systems

    “SLAM Attack: New Security Threat Exposed for Intel, AMD and Arm CPUs”

    “SLAM Attack: New Security Threat Exposed for Intel, AMD and Arm CPUs”

    Leave a Reply Cancel reply

    Your email address will not be published. Required fields are marked *

    See Also...

    Unmasking Fraudulent Loan Apps: A Deep Dive into the Dark Side of the Google Play Store

    Unmasking Fraudulent Loan Apps: A Deep Dive into the Dark Side of the Google Play Store

    Devious Loan Apps: Beware of the Digital Pickpocket! Cybersecurity researchers have unearthed 18 malevolent loan ...

    Latest News

    Innovating in Real Estate: Technology Landlords Can Use to Increase Profits and Make Management Easier
    news

    Innovating in Real Estate: Technology Landlords Can Use to Increase Profits and Make Management Easier

    bunee 02 Oct 2023
    And We’re Back!…
    news

    And We’re Back!…

    bunee 04 Jun 2023

    Tech Reviews

    Artificial Intelligence Takes Over Journalism: The Rise and Implications of AI-Generated Content in the Digital Age
    tech review

    Artificial Intelligence Takes Over Journalism: The Rise and Implications of AI-Generated Content in the Digital Age

    bunee 20 Jun 2023
    Tips and Gear to Stay Cool This Summer: Beat the Heat with These Simple Hacks
    tech review

    Tips and Gear to Stay Cool This Summer: Beat the Heat with These Simple Hacks

    bunee 20 Jun 2023
    The Importance of Technology Training for Government Employees
    tech review

    The Importance of Technology Training for Government Employees

    bunee 20 Jun 2023
    Choosing the Right Apple Laptop: A Guide for Budget and Professional Users
    tech review

    Choosing the Right Apple Laptop: A Guide for Budget and Professional Users

    bunee 20 Jun 2023
    “Oppenheimer Director Says AI is No More Dangerous Than Any Other Technology, but his New Movie Will Still Leave You Terrified”
    tech review

    “Oppenheimer Director Says AI is No More Dangerous Than Any Other Technology, but his New Movie Will Still Leave You Terrified”

    bunee 20 Jun 2023
    “US Counties Struggle with Severe Ob-Gyn Shortage: Post-Roe Laws Undermining Training Opportunities”
    tech review

    “US Counties Struggle with Severe Ob-Gyn Shortage: Post-Roe Laws Undermining Training Opportunities”

    bunee 20 Jun 2023
    Google’s Android Slate: The Ultimate Entertainment Hub and Smart Home Controller
    tech review

    Google’s Android Slate: The Ultimate Entertainment Hub and Smart Home Controller

    bunee 20 Jun 2023
    • Home
    • News
      • artificial intelligence
      • cyber-security
      • hacking attacks
      • software dev
      • automation
      • certifications
    • Videos
      • Youtube Videos
    • Resources

    Follow Us

    Popular Videos

    Newsletter

    Popular News

    • 1

      And We’re Back!…

    • 2

      New Magecart Campaign: Multiple Cybercrime Groups Operating Simultaneously

    • 3

      Major UK Organizations Suffer Data Breaches: Boots, British Airways, and the BBC Among Those Affected

    • 4

      Verizon Report: Human Error a Top Cause of Cybersecurity Incidents in 2019

    • 5

      Tech Firm Mitigates Ransomware Attack: Tips for Protection

    Fellow Sponsors

    Tags

    attacks break into cyber coinbase crypto hacking how to ransomware real estate technology updates
    (▀̿Ĺ̯▀̿ ̿) Copyright , All Rights Reserved
    Website courtesy of Lucid Perspective