Cybercriminals are using the Lumma information-stealing malware, now updated to track mouse movements with trigonometry to detect if it’s running on a real machine or an antivirus sandbox. Available since Dec 2022, Lumma version 4.0 also uses obfuscation, encrypted strings, dynamic configuration files, and crypto enforcement to evade security software. If it detects non-human like behaviour, it halts yet keeps monitoring for human-like activity.
Malware campaign abused flawed Avast Anti-Rootkit driver
Threat actors are exploiting a flawed Avast Anti-Rootkit driver to bypass detection, disable security tools and compromise targeted systems, Trellix researchers found. The malware corrupts