LummaStealer Weaponizes YubiKey Searches in Advanced SEO Poisoning Campaign

LummaStealer Weaponizes YubiKey Searches in Advanced SEO Poisoning Campaign

MEDIUM
April 22, 2026
7m read

Full Report

Executive Summary

A sophisticated information-stealing campaign is actively distributing the LummaStealer malware by targeting users searching for the YubiKey Manager software. The attack leverages SEO poisoning to direct victims to a malicious download site, initiating a complex, multi-stage infection chain designed to evade detection and maximize data theft. Key tactics include DLL Sideloading, in-memory payload execution via Process Hollowing, and privilege escalation to SYSTEM level. The ultimate goal is the widespread theft of sensitive credentials from browsers, FTP clients, and password managers, alongside the establishment of persistent backdoors for long-term access. This campaign represents a significant threat due to its advanced evasion techniques and the broad scope of targeted data.

Threat Overview

The attack begins when a user searches for legitimate software, in this case, YubiKey Manager. Through SEO poisoning, attackers manipulate search engine results to promote their malicious download site, yubico-app.com. A user downloading from this site receives a malicious ISO image. Mounting and executing the contained YUBICO_SETUP.EXE triggers the primary infection.

The executable is vulnerable to DLL sideloading and loads a malicious PYTHON311.DLL placed alongside it. This DLL acts as the initial dropper and orchestrator. It first uses a Base64-encoded PowerShell command to add exclusions for .exe, .com, and the Temp directory in Windows Defender, effectively blinding the default antivirus. Subsequently, it drops and executes a file named Health.exe, which is a disguised AutoIt interpreter. This interpreter runs an obfuscated script that unpacks and injects the final C++/Qt LummaStealer payload into memory using process hollowing, a technique that helps evade file-based detection signatures.

Technical Analysis

The attack chain demonstrates a deep understanding of offensive security techniques aimed at bypassing modern defenses. Attribution to LummaStealer is confirmed by the use of AutoIt scripts, .TOP C2 domains, specific sandbox evasion checks (for hostnames test22, NfZtFbPfH, ELICZ), and the creation of a scheduled task named NeuraLogix.

Initial Access and Execution

  1. Initial Access: The user is lured via SEO-poisoned search results to https[:]//yubico-app[.]com/yubikey-manager[.]php (T1566.001 - Phishing: Spearphishing Link).
  2. User Execution: The user downloads and mounts a malicious ISO file, executing YUBICO_SETUP.EXE (T1204.002 - User Execution: Malicious File).
  3. DLL Sideloading: The legitimate YUBICO_SETUP.EXE loads the malicious PYTHON311.DLL from the same directory (T1574.002 - Hijack Execution Flow: DLL Sideloading).

Defense Evasion and Payload Injection

  1. Impair Defenses: The malicious DLL executes a PowerShell command to add exclusions in Windows Defender, weakening endpoint security (T1562.001 - Impair Defenses: Disable or Modify Tools).
  2. Obfuscation & In-Memory Execution: An obfuscated AutoIt script (Health.exe) uses RC4 and LZNT1 decompression to unpack the final payload. It then uses Process Hollowing (T1055.012) to inject the LummaStealer DLL into a new process, avoiding writing the final payload to disk.

Privilege Escalation and Data Theft

  1. Privilege Escalation: The stealer payload calls grab::GetLocalSystemProcessToken to duplicate the access token from the winlogon.exe process, escalating its privileges to SYSTEM (T1134.002 - Access Token Manipulation: Create Process with Token). This elevated access is crucial for decrypting app-bound keys.
  2. Data Collection: With SYSTEM privileges, the malware performs extensive data theft (T1555.003 - Credentials from Password Stores: Credentials from Web Browsers), targeting:
    • 24 Chromium-based browsers and Firefox.
    • FTP/SSH clients like FileZilla, WinSCP, and PuTTY.
    • KeePass configuration files.
  3. Exfiltration: Stolen data is archived into a .zip file and exfiltrated via an HTTP POST request to the C2 server, Verifydl.top, using a spoofed Firefox User-Agent (T1041 - Exfiltration Over C2 Channel).

Persistence and Anti-Forensics

  1. Persistence: The malware establishes multiple forms of persistence:
  2. Cleanup: A RunOnce registry key named wextract_cleanup0 is used to delete temporary files upon the next user logon, hindering forensic analysis.

Impact Assessment

The primary impact is the large-scale theft of sensitive credentials, which can lead to financial fraud, identity theft, and unauthorized access to personal and corporate accounts. The theft of FTP, SSH, and password manager credentials poses a severe risk, as these can be used to pivot into corporate networks, access development infrastructure, or compromise other high-value assets. The installation of persistent backdoors like RDP and reverse tunnels transforms the initial credential theft into a long-term compromise, allowing attackers to maintain access, deploy additional malware (such as ransomware), and conduct further reconnaissance within the victim's network.

IOCs — Directly from Articles

Type
SHA256
Value
e70d3ebc928d2c199d7a62b130421c398b2dc89db48645585d67927b471912c4
Description
Malicious sideloaded DLL (PYTHON311.DLL)
Type
SHA256
Value
bcd08a8a103088ba2451a3a547725285a78894d71769494245c0aadf37e2e431
Description
Persistence executable (f27f4ef8-e729-4b5d-b095-2a405cb3380d.exe)
Type
Domain
Value
Verifydl.top
Description
Command and Control (C2) Server
Type
Domain
Value
yubico-app.com
Description
Malicious download domain
Type
URL
Value
https://yubico-app.com/yubikey-manager.php
Description
Malicious download URL

Cyber Observables — Hunting Hints

Security teams may want to hunt for the following patterns, which could indicate related activity:

Type
Process Name
Value
Health.exe
Description
Disguised AutoIt interpreter used to run the stealer.
Type
Process Name
Value
YUBICO_SETUP.EXE
Description
Legitimate process used for sideloading; monitor for suspicious child processes like powershell.exe.
Type
Command Line Pattern
Value
powershell.exe -enc
Description
Monitor for PowerShell executing encoded commands, especially if spawned by unexpected parent processes.
Type
Registry Key
Value
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
Description
Look for suspicious values, specifically containing wextract_cleanup0.
Type
Scheduled Task
Value
NeuraLogix
Description
Hunt for the creation or existence of a scheduled task with this name.
Type
Network Connection
Value
*.top
Description
Block or alert on connections to .top TLDs from non-browser processes.
Type
File Name
Value
PYTHON311.DLL
Description
Search for this file in directories containing YUBICO_SETUP.EXE or other legitimate executables.

Detection & Response

Effective detection requires a multi-layered approach focusing on behaviors rather than static signatures.

  • Endpoint Detection and Response (EDR): Deploy EDR solutions capable of detecting DLL Sideloading (T1574.002) and Process Hollowing (T1055.012). EDR rules should alert on YUBICO_SETUP.EXE (or other legitimate software) spawning powershell.exe or making outbound network connections. For detection, consider implementing D3FEND's Process Analysis.
  • PowerShell Logging: Enable enhanced PowerShell logging (Module, Script Block, and Transcription logs) to capture the full content of encoded commands used for defense evasion. This can help detect the addition of Windows Defender exclusions.
  • Network Monitoring: Monitor and alert on network traffic to known malicious TLDs like .top. Inspect HTTP/S traffic for connections matching the C2 domains. D3FEND's Network Traffic Analysis is a key defensive technique here.
  • Persistence Mechanisms: Regularly audit persistence locations, including scheduled tasks and Run/RunOnce registry keys. Use tools to scan for hidden scheduled tasks created via COM interfaces.

Mitigation

  • User Training (M1017): Educate users about the risks of SEO poisoning and the importance of downloading software only from official vendor websites. Verify URLs before clicking.
  • Application Control (M1038): Implement application allowlisting policies to prevent the execution of unauthorized software like Health.exe. This is a powerful defense against multi-stage malware. This can be mapped to D3FEND's Executable Allowlisting.
  • Endpoint Protection (M1049): Ensure antivirus and EDR solutions are enabled and configured to detect behavioral patterns, not just file signatures. Enable attack surface reduction (ASR) rules to block obfuscated scripts and suspicious process behaviors.
  • Restrict PowerShell: If not required for administrative tasks, use PowerShell Constrained Language Mode or restrict its execution via Group Policy to prevent its abuse for defense evasion.
  • Multi-Factor Authentication (MFA) (M1032): Enforce MFA on all external and critical internal services to mitigate the impact of stolen credentials.

Timeline of Events

1
April 21, 2026
User searches for YubiKey Manager and is led to a malicious site via SEO poisoning.
2
April 21, 2026
User downloads and mounts a malicious ISO file, executing 'YUBICO_SETUP.EXE'.
3
April 21, 2026
The executable sideloads a malicious 'PYTHON311.DLL'.
4
April 21, 2026
PowerShell is launched to add Windows Defender exclusions for '.exe', '.com', and the Temp directory.
5
April 21, 2026
The masqueraded AutoIt interpreter 'Health.exe' is dropped and executed.
6
April 21, 2026
The AutoIt script unpacks and injects the LummaStealer payload into memory using Process Hollowing.
7
April 21, 2026
LummaStealer duplicates the winlogon token to gain SYSTEM privileges.
8
April 21, 2026
The malware steals credentials from browsers, FTP clients, and KeePass, then takes a screenshot.
9
April 21, 2026
Stolen data is archived and exfiltrated via HTTP POST to the C2 server 'verifydl.top'.
10
April 21, 2026
Persistence is established via a RunOnce registry key and a scheduled task named 'NeuraLogix'.
11
April 22, 2026
This article was published

Timeline of Events

1
April 21, 2026

User searches for YubiKey Manager and is led to a malicious site via SEO poisoning.

2
April 21, 2026

User downloads and mounts a malicious ISO file, executing 'YUBICO_SETUP.EXE'.

3
April 21, 2026

The executable sideloads a malicious 'PYTHON311.DLL'.

4
April 21, 2026

PowerShell is launched to add Windows Defender exclusions for '.exe', '.com', and the Temp directory.

5
April 21, 2026

The masqueraded AutoIt interpreter 'Health.exe' is dropped and executed.

6
April 21, 2026

The AutoIt script unpacks and injects the LummaStealer payload into memory using Process Hollowing.

7
April 21, 2026

LummaStealer duplicates the winlogon token to gain SYSTEM privileges.

8
April 21, 2026

The malware steals credentials from browsers, FTP clients, and KeePass, then takes a screenshot.

9
April 21, 2026

Stolen data is archived and exfiltrated via HTTP POST to the C2 server 'verifydl.top'.

10
April 21, 2026

Persistence is established via a RunOnce registry key and a scheduled task named 'NeuraLogix'.

Sources & References

LummaStealer Delivered Via Malicious Search Results
Unit 42 (unit42.paloaltonetworks.com) April 21, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

📢 Share This Article

Help others stay informed about cybersecurity threats