Zombie Cookie Apocalypse: Google Under Siege by Lumma Infostealer Malware

In a twist fit for a cyber-thriller, Lumma infostealer malware can now resurrect expired Google cookies, unleashing a potential cybersecurity nightmare. Enter stage right, Rhadamanthys, with the same eerie ability. It’s a clash of the undead in this Google Cookie Restoration Malware saga. Stay tuned, folks!

Hot Take:

Oh, cookies! Not the delicious, chocolate-chip kind we all love to binge on but the Google variety. So, the Lumma infostealer malware has learnt a new trick, and it’s not a cute one. Now it can resurrect expired Google cookies, which can be a nightmare for even the most cybersecurity-savvy organizations. Warnings are coming in from Hudson Rock’s cybersecurity researchers, it’s like a horror movie right? Imagine a zombie apocalypse, only with cookies. The plot thickens, as Lumma is not the only infostealer with this cookie-raising-from-the-dead ability; enter Rhadamanthys. It’s a digital battle of the undead and Google seems to be caught in the crossfire!

Key Points:

  • The latest version of Lumma infostealer malware can revive expired Google cookies, posing a huge cybersecurity risk.
  • The new feature was discovered through an ad on a dark web forum, stating that it only applies to Google cookies.
  • A month’s subscription to this version of the malware costs a whopping $1000.
  • Google has yet to comment on this newfound threat, while Lumma continues to bypass Google’s newly introduced restrictions.
  • Lumma isn’t the only infostealer with this feature, Rhadamanthys also announced a similar capability.

Need to know more?

Resurrecting Cookies: A High-Priced Endeavor

The new version of Lumma infostealer malware doesn't come cheap. If you're a hacker with a taste for zombie cookies, prepare to fork out a cool $1000 for a month’s subscription. However, once you're in, every session cookie can be used twice, enough to launch a devastating attack on unsuspecting organizations.

Google’s Silent War

Google, the cookie monster in this scenario, has been rather tight-lipped about the whole affair. However, their silence doesn't imply inaction. There seems to be a tug-of-war between Google and Lumma, with the latter continuously bypassing Google’s newly introduced restrictions. It's like watching a high-stakes game of cyber chess.

Attack of the Clones

Adding to the drama, Lumma isn't the only player in this game of digital resurrection. Rhadamanthys has also announced a similar feature, stirring up speculations about a potential security vulnerability. Lumma’s developers beg to differ, claiming Rhadamanthys blatantly copied their design. It's a digital soap opera, folks!

Reality Check

While all this makes for a great cyber-thriller, it's difficult to confirm if these features work as advertised or if they're just part of an elaborate scare tactic. As a precaution, stick to downloading programs and applications from verified sources. Remember, don't accept cookies from strangers!
Tags: BleepingComputer, dark web, Google Cookies, Lumma, Malware, security vulnerability, Verified Sources