Cybercriminals are using the Lumma information-stealing malware, now updated to track mouse movements with trigonometry to detect if it’s running on a real machine or an antivirus sandbox. Available since Dec 2022, Lumma version 4.0 also uses obfuscation, encrypted strings, dynamic configuration files, and crypto enforcement to evade security software. If it detects non-human like behaviour, it halts yet keeps monitoring for human-like activity.

Microsoft warns of new remote access trojan targeting crypto wallets
Microsoft has discovered a new remote access trojan (RAT) called StilachiRAT that targets 20 cryptocurrency wallet extensions in the Google Chrome browser. The malware can