The Lumma infostealer malware has made a swift comeback after a coordinated takedown effort by global law enforcement agencies in May 2025. Despite the seizure of over 2,300 domains and major disruption to its infrastructure, the malware-as-a-service (MaaS) platform has bounced back with new distribution tactics and restored capabilities.
Major Disruption, Minor Setback
Lumma, also known as LummaC2, was targeted in a high-profile operation involving Microsoft, the U.S. Department of Justice, Europol, and several international partners. The campaign dismantled core parts of the malware’s infrastructure and significantly impacted its reach. Turns out it was temporary.
Before the takedown, Lumma had infected over 394,000 Windows devices and was one of the most active infostealers used by cybercriminals, including the Scattered Spider group. The malware harvested sensitive data, including credentials and browser-stored information, and sold it through a subscription model to cybercriminals worldwide.
Malware-as-a-Service Strikes Back
According to Trend Micro, Lumma’s operators wasted no time. In the weeks following the disruption, the malware’s activity quickly surged back to nearly pre-takedown levels. The group reportedly moved to new hosting providers, including Russian-based services like Selectel, bypassing Cloudflare protections previously used.
Lumma is now being spread via:
-
Cracked software and cheat tool downloads
-
CAPTCHA-protected sites hosting fake installers
-
Trojanized executables on GitHub
-
Malicious social media links impersonating legitimate downloads
Researchers believe that the group had fallback infrastructure ready and may not have lost access to critical servers during the law enforcement action. This rapid recovery reveals how resilient and decentralized these MaaS operations have become.
Law Enforcement Alone Isn’t Enough
The Lumma resurgence highlights a persistent issue in the fight against cybercrime: infrastructure takedowns may only cause short-term disruptions unless paired with arrests and legal consequences. Similar cases like RedLine and other infostealers have followed the same pattern: brief pauses, then full recovery.
Lumma’s operators even boasted in underground forums shortly after the takedown, claiming their malware was “wiped, not broken” and promising a return. That promise appears to have been fulfilled.
Final Thoughts
The return of Lumma Infostealer underscores the challenges of dismantling modern cybercrime operations. While international law enforcement can temporarily disrupt these services, the lack of arrests or developer identification means the threat is far from over. Organizations must stay vigilant, use strong endpoint protection, and educate users on avoiding cracked software and suspicious links.
The war against infostealers like Lumma is ongoing—and far from won.