High school math concepts have graduated from your old textbooks and migrated to the world of tech maladies. The malicious malware known as LummaC2, also referred to as Lumma Stealer, has gotten a bit of a brain transplant. Not to increase its IQ, but to amp up its stealth mode. It’s now equipped with a trigonometry-based anti-sandbox technique that allows it to slyly evade detection while it exfiltrates valuable data from host systems.
Ever played hide-and-seek with a piece of malware? Well the Lumma Stealer does that, but on a whole other level. The devious little software doesn’t just hide in the shadows; it waits! How patiently? Until it detects human mouse activity! This “delayed detonation” technique allows Lumma Stealer to stay incognito, making it much harder for antivirus software to expose it. It’s like an introverted party-crasher – it only gets lively when it detects some real human fun.
Our very own Sherlock Holmes in this mystery saga is Alberto Marín, a security researcher with Outpost24. He’s shed some light on how this shadowy figure, the Lumma Stealer, applies trigonometry principles to evade detection. According to him, the malware is queuing up a whole lot of trig homework to confuse the cyber defense mechanisms, all while it steals your data. The cool kids call it the “Mathematical Heist.”
All in all, it seems like LummaC2 or Lumma Stealer is getting craftier with its evasion techniques. By utilizing trigonometry, it’s not only expanding its capabilities but also showcasing that malicious software can cross academic boundaries when it comes to causing havoc. So cheer up folks, the world where malware studied harder than us has already arrived.
Original Article: https://thehackernews.com/2023/11/lummac2-malware-deploys-new.html
No products in the cart.