Cloudflare has played a key role in a global collaborative effort to dismantle Lumma Stealer (also known as LummaC2), a notorious malware-as-a-service (MaaS) threat. Cloudflare’s Cloudforce One and Trust and Safety team partnered with Microsoft, other cybersecurity companies, and law enforcement agencies—including the U.S. Department of Justice, Europol’s EC3, and Japan’s JC3—to disrupt the malware’s infrastructure.
Lumma Stealer is designed to extract sensitive user information such as credentials, cookies, and cryptocurrency wallets from infected systems. It enables downstream criminal activities like financial fraud, identity theft, and enterprise breaches that can potentially lead to ransomware attacks. Lumma was abusing infrastructure from multiple service providers, including Cloudflare, to carry out its malicious operations.
The malware is typically spread via social engineering tactics such as phishing emails, malvertising, and compromised software. It offers cybercriminals a rented control panel where stolen data can be accessed and custom malware builds generated.
The coordinated disruption cut off Lumma operators from their administrative panels, stolen data marketplaces, and command infrastructure—making it significantly harder and costlier for them to continue operations. This action not only protects users but also destabilizes the broader cybercrime ecosystem.
To mitigate threats like Lumma, security experts recommend a layered defense strategy. Enterprises should restrict access to newly registered domains (a common tactic used by LummaC2) and limit script execution like PowerShell where unnecessary, especially for non-enterprise users. The operation underscores the importance of global collaboration in combatting evolving cyber threats.
To protect against threats like Lumma Stealer, organizations should adopt a multi-layered security approach. This includes restricting the download and execution of untrusted files, scripts, and macros, using reputable EDR tools, and enforcing application allowlisting. PowerShell access should be limited for non-admin users.
Credential hygiene is critical—use password managers, disable autofill, and clear browser caches. Regular patching, DNS and email filtering, and secure web browsing practices are essential. User awareness training should cover malvertising, fake installers, and scareware. Finally, continuous monitoring for suspicious activity—such as unauthorized access, rare outbound connections, or PowerShell misuse—strengthens threat detection and response capabilities.