Getty Images
In a coordinated international takedown, Microsoft announced it has successfully disrupted the Lumma Stealer malware ecosystem—a cybercrime operation that compromised nearly 394,000 Windows computers worldwide in just two months.
The malware, used extensively by cybercriminals since at least 2022, was engineered to harvest sensitive data such as login credentials, banking information, cryptocurrency wallet keys, and personal identity details.
Between March 16 and May 16, 2025, Microsoft’s Digital Crimes Unit (DCU) detected 394,000 unique infections across a wide range of systems, making Lumma one of the most pervasive malware strains seen this year. The malware was particularly dangerous due to its ease of deployment and its ability to bypass many common cybersecurity defenses.
According to Microsoft, Lumma became the tool of choice for hackers running large-scale phishing campaigns and digital theft schemes. One notable case involved cybercriminals impersonating Booking.com in a phishing operation designed to lure unsuspecting users into downloading the malware.
Microsoft reported that Lumma wasn’t just used to exploit individual users. The malware has been involved in attacks against a variety of industries, including:
Cybersecurity firm Bitsight corroborated Microsoft’s findings, adding that Lumma's architecture made it especially appealing for attackers targeting critical infrastructure.
The takedown effort was led by Microsoft in conjunction with the U.S. Department of Justice, Japan’s Cybercrime Control Center, Europol, and several private sector partners, including Cloudflare, Lumen Technologies, and Bitsight.
A U.S. District Court order from the Northern District of Georgia allowed Microsoft to take over more than 1,300 domains used to host and distribute Lumma. Of these, 300 were directly seized or shut down with Europol's help. These domains are now being redirected to Microsoft-controlled “sinkholes,” cutting off communication between infected devices and the malware’s command servers.
Microsoft stated that Japan’s cybercrime authorities also contributed by suspending Lumma’s infrastructure within their jurisdiction.
Unlike traditional malware, Lumma was sold through underground marketplaces and Telegram channels, operating under a malware-as-a-service (MaaS) model. This meant even low-skilled hackers could rent the malware and deploy it using off-the-shelf phishing kits.
Microsoft’s investigation found that the malware was continually updated by its developers to enhance its stealth, evade detection systems, and expand compatibility with newer versions of Windows.
Microsoft emphasized that while the infrastructure behind Lumma has been significantly disrupted, users should remain vigilant. Victims are being notified where possible, and Microsoft has released updates to its security software to help detect and remove the malware.
"Working with law enforcement and industry partners, we have severed communications between the malicious tool and victims," Microsoft noted. The company urges IT administrators and individuals to monitor their systems, change passwords, and enable two-factor authentication wherever possible.
The successful takedown of Lumma is a major win for the cybersecurity community but also a stark reminder of the evolving threats posed by organized cybercrime. As threat actors grow more sophisticated and malware becomes increasingly accessible, proactive collaboration between governments and the tech sector remains essential in safeguarding digital infrastructure.