Cybercriminals are using the Lumma information-stealing malware, now updated to track mouse movements with trigonometry to detect if it’s running on a real machine or an antivirus sandbox. Available since Dec 2022, Lumma version 4.0 also uses obfuscation, encrypted strings, dynamic configuration files, and crypto enforcement to evade security software. If it detects non-human like behaviour, it halts yet keeps monitoring for human-like activity.
![](https://healsecurity.com/wp-content/uploads/2024/07/group-ibs-threat-intelligence-and-defence-centre-equip-undergraduates-with-sophisticated.jpg)
Group-IB’s Threat Intelligence and Defence Centre Equip Undergraduates with Sophisticated Cybersecurity Technologies to Boost Threat Analysis and Enhance Cyber Resilience for Campus Start-ups
Hey there from the heart of the San Francisco Bay Area! It’s an absolute pleasure to have you back again for our chat on some