
Starting out 2025 strong, LummaC2 stealer activity dropped sharply after a government takedown in May.
LummaC2, also known as LummaC or Lumma Stealer, is a malware-as-a-service (MaaS) stealer that has been available for purchase on underground forums since at least mid-2022. Subscriptions start at $250 USD per month, all the way up to a one-time payment of $20,000 USD to gain access to Lumma source code. Adversaries favor the MaaS model because they can launch their operations with relative ease and low overhead, giving them access to effective malware like LummaC2 with continuous development, customer support, and a range of features.
Because it’s distributed as a MaaS offering, LummaC2 is used against many targets opportunistically, with no particular industry or geography being an exclusive recipient.
Similar to other stealers, LummaC2 was initially designed to target cryptocurrency wallets, browser information, and 2FA tokens, but it has expanded beyond its original scope. It remains in active development, and over time has added features including customizable stealer configurations and a loader capability for delivering additional payloads via EXE, DLL, or PowerShell.
LummaC2’s popularity peaked in late 2024 and early 2025 as adversaries used it in many paste-and-run campaigns. Its popularity drew attention from international law enforcement and cybersecurity community members, culminating in a takedown of LummaC2 infrastructure in May 2025.
Initial access indicators of compromise (IOC) vary according to the delivery method and loader chosen by the adversary, so early detection telemetry differs from case to case. LummaC2 delivery vehicles have been presented to users in an array of creative ways, including:
Adversaries have also used the same methods to deliver NetSupport Manager, Rhadamanthys, and StealC alongside LummaC2 on the same affected systems.
We described LummaC2’s paste-and-run tactic in our November 2024 Intelligence Insights, and paste and run remained a widespread tactic in 2025 to distribute multiple malware families.
In January 2025 we saw LummaC2 threats that began with the victim interacting with fake CAPTCHA-style paste-and-run lures. Successful paste-and-run execution resulted in mshta.exe reaching out to goatstuff[.]store to retrieve PowerShell.
While the atomic indicators for paste-and-run campaigns changed often in 2025, nearly every campaign leading to LummaC2 leveraged Mshta or PowerShell in some fashion, illustrating how adversaries tend to keep portions of their playbooks that “just work.”
Behavioral detection of LummaC2 can vary quite a bit since it requires distributors to use crypters. Multiple detection analytics could catch LummaC2 simply because an adversary configured the crypter in a particular way. Crypters that we’ve observed paired with LummaC2 include PureCrypter and CypherIT.
Depending on the delivery method and adversary configurations, LummaC2 may be injected into a hollowed process—we’ve observed OpenWith.exe and more.com, among others—or leverage DLL side-loading for execution. The stealer activity occurs within memory with direct exfiltration to C2, however in some cases collected data may be staged in text files like System.txt prior to ZIP archiving for theft. This means that looking for C2 activity or suspicious TXT file creation may also help detect LummaC2. It does not maintain persistence on its own, however accompanying loaders or follow-on payloads may create and maintain persistence.
LummaC2 relies on HTTPS for exfiltration of data to adversary systems. In late 2023 to early 2024, the developers of the stealer migrated its exfiltration capabilities to use HTTPS over plaintext HTTP in an effort to to evade network-based detection controls. Along with using HTTPS for encrypted communications, LummaC2 developers also leverage Cloudflare services to make their exfiltration systems resilient and highly available.
As the stealer became more mature in 2024, LummaC2 incorporated more features to remain on the bleeding edge of the stealer market. To ensure data exfiltration even when interrupted, the LummaC2 developers included functionality to send information in piecemeal rather than doing the “collect, stage, send” technique. In addition, when Google implemented application bound encryption (ABE) in Chromium browsers, LummaC2 was rapid to adopt new techniques to obtain browser cookies and bypass ABE.
ABE experimentation continued into 2025, as we observed some instances of LummaC2 using the Chromium --remote-debugging-port technique used by other malware.
Multiple community members and international law enforcement worked to take down LummaC2 infrastructure in May 2025, and this definitely affected LummaC2 operations. In our own data, we can observe Lumma’s peak in popularity earlier this year followed by a downturn after May.
We observed low levels of LummaC2 in May and June 2025, followed by a solid effort in distribution for July and August. We’ve seen no instances of LummaC2 since October 2025.
Details about infrastructure used by MaaS malware can often provide some insights into the malware’s operations and difficulties. In the case of LummaC2, we can observe changes in Autonomous System Numbers (ASNs) used to host or proxy LummaC2 before and after the takedown. To make this analysis possible, we used passive DNS records for LummaC2 exfiltration domains we observed from open source intelligence during 2025 with a cutoff date of December 30, 2025.
In the case of server hosting, we can see that LummaC2 domains from January to June 2025 almost exclusively resolved to Cloudflare IP addresses.
After June 2025, the DNS records show that Lumma’s operators likely diversified into multiple different hosting providers. While they still attempted to use Cloudflare, operators also explored at least seven hosting providers that are present on the Spamhaus Do Not Route or Peer (DROP) list, which catalogs sections of the internet that tend to fraudulent traffic:
AEZA-AS (210644)AS-VD (47105, 203834)CHSN-AS (1997865)PROSPERO-AS (200593)PROTON66 (198953)ROUTERHOSTING (149956)ZHOUYISAT-COMMUNICATIONS (400992)
This trend suggests that Lumma infrastructure was pushed away from using legitimate infrastructure like Cloudflare into hosting providers on less savory portions of the Internet. As a result, organizations using network security tools similar to the DROP list are more likely to block LummaC2 traffic now than in the first half of 2025 before the takedown.
Since LummaC2 has been distributed in so many different ways, preventative measures can take many approaches. We’ve observed LummaC2 distributed in malicious advertisements, fake software installations, paste-and-run campaigns, and more. We’ve also observed it delivered in script form, via DLL sideloads.
General preventative measures that apply to multiple malware families also help fight against LummaC2:
For response, an excellent playbook would look something like this:
invoke-expression to download contentThis pseudo-detection analytic identifies instances of PowerShell using invoke-expression to download content from an HTTP URL. Adversaries attempting to deliver threats like LummaC2 use this function to download remotely hosted scripts and code for further exploitation of an endpoint. Note that legitimate package management and orchestration utilities like Chocolatey may use this function to update themselves.
Note: * is a placeholder for strings associated with legitimate use of this function in your environment
process == (powershell)
&&
deobfuscated_command_line_includes (iex)
||
deobfuscated_command_line_includes ('.invoke' || 'invoke-expression')
&&
deobfuscated_command_line_includes (http)
&&
command_line_does_not_include == (*)