Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»LummaStealer infections surge after CastleLoader malware campaigns
    Cybersecurity

    LummaStealer infections surge after CastleLoader malware campaigns

    adminBy adminFebruary 11, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    LummaStealer infections surge after CastleLoader malware campaigns
    Share
    Facebook Twitter LinkedIn Pinterest Email

    LummaStealer infections surge after CastleLoader malware campaigns

    A surge in LummaStealer infections has been observed, driven by social engineering campaigns leveraging the ClickFix technique to deliver the CastleLoader malware.

    LummaStealer, also known as LummaC2, is an infostealer operation running as a malware-as-a-service (MaaS) platform that was disrupted in May 2025 when multiple tech firms and law enforcement authorities seized 2,300 domains and the central command structure supporting the malicious service.

    Infostealing malware targets various sensitive data that can range from credentials and cookies stored in web browsers, cryptocurrency wallet details, and documents to session cookies, authentication tokens, VPN configurations, and account data.

    Wiz

    Although the law enforcement operation severely disrupted the LummaStealer activity, the MaaS operation started to resume in July 2025.

    A new report from cybersecurity company Bitdefender warns that LummaStealer operations have scaled significantly between December 2025 and January 2026, now being delivered through a malware loader called CastleLoader, and increasingly relying on ClickFix techniques.

    “At the core of many of these campaigns is CastleLoader, which plays a central role in helping LummaStealer spread through delivery chains. Its modular, in-memory execution model, extensive obfuscation, and flexible command-and-control communication make it well-suited to malware distribution of this scale,” Bitdefender researchers say.

    CastleLoader emerged in early 2025 and has been distributing multiple families of infostealers and remote access trojans (Stealc, RedLine, Rhadamanthys, MonsterV2, CastleRAT, SectopRAT, NetSupport RAT, WarmCookie) through various methods, including ClickFix.

    The malware loader is a heavily obfuscated script-based (AutoIT or Python) malware loader that decrypts, loads, and executes the LummaStealer payload entirely in memory.

    It employs multiple obfuscation layers, including dictionary-based renaming of variables and functions, encoded strings decoded at runtime, large amounts of junk code and dead branches, and arithmetic and logic operations that resolve to trivial results.

    Typical infection chain
    Typical infection chain
    Source: Bitdefender

    Before executing LummaStealer, CastleLoader performs environment and sandbox checks to determine if it’s being analyzed, and adjusts file paths and persistence locations depending on which security products are detected on the host.

    Persistence is achieved by copying the malicious AutoIT script to a persistence path, copying the interpreter to a separate location, and creating an internet shortcut file on Startup that launches the interpreter with the script as an argument.

    Bitdefender found that CastleLoader deliberately initiates a failed DNS lookup for a non-existent domain, resulting in a DNS failure. The cybersecurity company says that artifacts from this network behavior can be used to detect CastleLoader activity.

    In a report in November, researchers at Recorded Future’s Insikt Group noted that a domain on CastleLoader’s infrastructure acted as a command-and-control (C2) server for LummaStealer, indicating an early connection between the two operations.

    Currently, LummaStealer is distributed via multiple channels, including trojanized software installers, pirated software downloaded from fake sites or torrents, and fake media or game archives in campaigns targeting countries all over the world.

    Countries targeted in LummaStealer campaigns
    Countries targeted in LummaStealer campaigns
    Source: Bitdefender

    According to the researchers, ClickFix is a “highly effective infection vector in LummaStealer campaigns.” Users are served fake CAPTCHA or verification pages with detailed instructions to execute a malicious PowerShell command that had already been added to the clipboard.

    The command ultimately retrieves a malicious script from the attacker’s server and executes it on the local machine. The payload delivered this way was CastleLoader, which, in some cases, fetched and executed the LummaStealer info-stealing malware.

    To defend against this threat, Bitdefender researchers recommend users avoid downloading and executing software or media (especially if the file has a .EXE extension) from  untrusted or unofficial sources.

    Also, executing commands you don’t understand in PowerShell or command-line utilities as part of a website’s verification process is a red flag for malicious activity.

    The general advice is to steer clear of pirated software (e.g., cracks, “unlocked” tools) and hide promoted results on Google Search by using an ad blocker.


    tines

    Modern IT infrastructure moves faster than manual workflows can handle.

    In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.

    Campaigns CastleLoader infections LummaStealer Malware surge
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleHidden HTTP Page Can Cause Site Name Problems In Google
    Next Article Nokia predicts huge WAN traffic growth, but experts question assumptions
    admin
    • Website

    Related Posts

    Apple account change alerts abused to send phishing emails

    April 19, 2026

    Social media bans might steer kids into riskier corners of the internet

    April 19, 2026

    Vercel confirms breach as hackers claim to be selling stolen data

    April 19, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    I replaced my entire streaming setup with a $30 device and free apps

    April 20, 2026

    Blood Strike – FPS for all 1.003.650015 APK Download by NetEase Games

    April 20, 2026

    The Ray-Ban Meta (Gen 1) smart glasses just scored a rare 25% discount at Amazon

    April 20, 2026

    The best robot vacuum in Australia: reliable, effective, effort-free automated cleaners

    April 20, 2026
    Categories
    • Blogging (65)
    • Cybersecurity (1,403)
    • Privacy & Online Earning (172)
    • SEO & Digital Marketing (850)
    • Tech Tools & Mobile / Apps (1,686)
    • WiFi / Internet & Networking (232)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    I replaced my entire streaming setup with a $30 device and free apps

    April 20, 2026

    Blood Strike – FPS for all 1.003.650015 APK Download by NetEase Games

    April 20, 2026

    The Ray-Ban Meta (Gen 1) smart glasses just scored a rare 25% discount at Amazon

    April 20, 2026
    Most Popular
    • I replaced my entire streaming setup with a $30 device and free apps
    • Blood Strike – FPS for all 1.003.650015 APK Download by NetEase Games
    • The Ray-Ban Meta (Gen 1) smart glasses just scored a rare 25% discount at Amazon
    • The best robot vacuum in Australia: reliable, effective, effort-free automated cleaners
    • Monitor spec sheets hide the one thing that actually decides whether a display feels premium
    • Apple account change alerts abused to send phishing emails
    • Apple AirPods Pro 3 review: A masterclass in sound, a lesson in lock-in
    • Samsung Galaxy S23 Ultra versus vivo X300 Ultra
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.