aka.ms/Lumma-Stealer

Preview meta tags from the aka.ms website.

Linked Hostnames

33

Thumbnail

Search Engine Appearance

Google

https://aka.ms/Lumma-Stealer

Lumma Stealer: Breaking down the delivery techniques and capabilities of a prolific infostealer | Microsoft Security Blog

Over the past year, Microsoft Threat Intelligence observed the persistent growth and operational sophistication of Lumma Stealer, an info-stealing malware used by multiple financially motivated threat actors to target various industries. Microsoft, partnering with others across industry and international law enforcement, facilitated the disruption of Lumma infrastructure.



Bing

Lumma Stealer: Breaking down the delivery techniques and capabilities of a prolific infostealer | Microsoft Security Blog

https://aka.ms/Lumma-Stealer

Over the past year, Microsoft Threat Intelligence observed the persistent growth and operational sophistication of Lumma Stealer, an info-stealing malware used by multiple financially motivated threat actors to target various industries. Microsoft, partnering with others across industry and international law enforcement, facilitated the disruption of Lumma infrastructure.



DuckDuckGo

https://aka.ms/Lumma-Stealer

Lumma Stealer: Breaking down the delivery techniques and capabilities of a prolific infostealer | Microsoft Security Blog

Over the past year, Microsoft Threat Intelligence observed the persistent growth and operational sophistication of Lumma Stealer, an info-stealing malware used by multiple financially motivated threat actors to target various industries. Microsoft, partnering with others across industry and international law enforcement, facilitated the disruption of Lumma infrastructure.

  • General Meta Tags

    18
    • title
      Lumma Stealer: Breaking down the delivery techniques and capabilities of a prolific infostealer | Microsoft Security Blog
    • title
      Your Privacy Choices Opt-Out Icon
    • charset
      UTF-8
    • awa-pageType
      Post
    • awa-market
      en-us
  • Open Graph Meta Tags

    10
    • US country flagog:locale
      en_US
    • og:type
      article
    • og:title
      Lumma Stealer: Breaking down the delivery techniques and capabilities of a prolific infostealer | Microsoft Security Blog
    • og:description
      Over the past year, Microsoft Threat Intelligence observed the persistent growth and operational sophistication of Lumma Stealer, an info-stealing malware used by multiple financially motivated threat actors to target various industries. Microsoft, partnering with others across industry and international law enforcement, facilitated the disruption of Lumma infrastructure.
    • og:url
      https://www.microsoft.com/en-us/security/blog/2025/05/21/lumma-stealer-breaking-down-the-delivery-techniques-and-capabilities-of-a-prolific-infostealer/
  • Twitter Meta Tags

    5
    • twitter:card
      summary_large_image
    • twitter:label1
      Written by
    • twitter:data1
      Microsoft Threat Intelligence, Microsoft Digital Crimes Unit, Microsoft Security Experts
    • twitter:label2
      Est. reading time
    • twitter:data2
      17 minutes
  • Link Tags

    37
    • alternate
      https://www.microsoft.com/en-us/security/blog/feed/
    • alternate
      https://www.microsoft.com/en-us/security/blog/comments/feed/
    • alternate
      https://www.microsoft.com/en-us/security/blog/wp-json/wp/v2/posts/138934
    • alternate
      https://www.microsoft.com/en-us/security/blog/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fblog%2F2025%2F05%2F21%2Flumma-stealer-breaking-down-the-delivery-techniques-and-capabilities-of-a-prolific-infostealer%2F
    • alternate
      https://www.microsoft.com/en-us/security/blog/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fblog%2F2025%2F05%2F21%2Flumma-stealer-breaking-down-the-delivery-techniques-and-capabilities-of-a-prolific-infostealer%2F&format=xml

Links

247