Description

Cybersecurity experts from Veriti’s cyber research team have uncovered the Lummac Stealer malware, also known as LummaC2 Stealer, disguised as an "OnlyFans Checker" tool aimed at hackers. The malware, offered by a user named “Bilalkhanicom” on a hacking forum, promised to help users access sensitive OnlyFans account information. Instead, those who downloaded the tool were infected with Lummac Stealer, which steals passwords, financial data, browsing history, and cryptocurrency wallets. The Lummac Stealer campaign does not only target those looking to hack OnlyFans accounts. Similar tactics are being used to trick hackers targeting other platforms, including Disney+, Instagram, and even botnet networks. Malicious installers are cleverly named to appeal to hackers' interests. For example, "DisneyChecker.exe" targets Disney+ accounts, "InstaCheck.exe" targets Instagram users, and "ccMirai.exe" is aimed at botnet operators, referencing the infamous Mirai malware used in global DDoS attacks. Lummac Stealer has been active since at least 2023, with a new version, LummaC2 v4.0, discovered using advanced techniques like trigonometric detection to evade defenses. In January 2024, the malware was spread through cracked software distributed via compromised YouTube channels. While the origin of Bilalkhanicom remains unknown, folder names within the malware suggest influences from East Asia, Africa, Latin America, and even Celtic mythology. This is not the first time OnlyFans has been used as bait for malware. In June 2023, attackers used fake OnlyFans content to spread the DcRAT malware, targeting smartphone users by exploiting their interest in explicit content.