New Zealand Launches Massive Public Alert, Warning 26,000 Citizens of Lumma Stealer Malware Infections

New Zealand's NCSC Emails 26,000 Individuals in Unprecedented Warning About Lumma Stealer Malware

HIGH
December 17, 2025
4m read
MalwarePhishingData Breach

Impact Scope

People Affected

26,000

Industries Affected

GovernmentFinanceOther

Geographic Impact

New Zealand (national)

Related Entities

Products & Tech

Microsoft Windows

Full Report

Executive Summary

New Zealand's National Cyber Security Centre (NCSC) has undertaken an unprecedented public outreach campaign, directly emailing approximately 26,000 individuals to alert them that their devices may be infected with the Lumma Stealer malware. This large-scale notification, a first for the agency, addresses a significant campaign by the potent information-stealing malware. Lumma Stealer targets Microsoft Windows systems to covertly steal a wide range of sensitive data, including passwords, browser cookies, banking information, and cryptocurrency wallets. The NCSC has warned that some compromised credentials have already been linked to government and financial institution systems, posing a serious and immediate risk of financial fraud and identity theft to the affected individuals. The alert directs recipients to official resources for remediation and security hygiene.


Threat Overview

Lumma Stealer is a prominent Malware-as-a-Service (MaaS) info-stealer available for purchase on dark web forums. This business model allows even low-skilled cybercriminals to deploy sophisticated attacks. The primary goal of Lumma Stealer is data theft for financial gain.

  • Infection Vector: While not specified in the articles, info-stealers like Lumma are typically distributed through phishing emails with malicious attachments, cracked software downloads, or malvertising campaigns that trick users into downloading a malicious file.
  • Targeted Data: Once executed on a victim's Windows machine, the malware operates stealthily to collect:
    • Credentials stored in web browsers (e.g., Chrome, Firefox, Edge)
    • Session cookies, which can be used to bypass MFA
    • Credit card and banking information
    • Cryptocurrency wallet files and browser extension data
    • System information and credentials for other applications like FTP clients or VPNs.
  • Exfiltration: The stolen data is packaged and exfiltrated to an attacker-controlled server, often using protocols like HTTP or via platforms like Telegram.

The NCSC's action was prompted by intelligence received from international and domestic partners, indicating a significant number of New Zealanders were compromised in this campaign.


Technical Analysis

Info-stealers like Lumma Stealer follow a well-defined attack pattern:

  1. Delivery & Execution: The malware is delivered to the victim, often disguised as a legitimate document or installer. The user is tricked into executing it, aligning with T1204.002 - User Execution: Malicious File.
  2. Defense Evasion: The malware often employs obfuscation and anti-analysis techniques to avoid detection by antivirus software and to hinder reverse engineering.
  3. Credential Access: This is the primary function. The malware systematically targets local data stores for sensitive information.
  4. Collection: The stealer gathers data from various sources, including files related to cryptocurrency wallets (T1631 - Steal or Forge Authentication Certificates), and packages it for exfiltration.
  5. Command & Control / Exfiltration: The collected data is sent to the C2 server. T1041 - Exfiltration Over C2 Channel is commonly used.

Impact Assessment

The impact on the 26,000 affected individuals is significant and multi-faceted:

  • Financial Loss: Stolen banking credentials and cryptocurrency wallet data can lead to direct and immediate theft of funds.
  • Identity Theft: The wealth of stolen personal information can be used to open fraudulent accounts, take out loans, or commit other forms of identity fraud.
  • Account Takeover: Compromised passwords for email, social media, and other online services can lead to a complete takeover of a person's digital life.
  • Corporate and Government Risk: As confirmed by the NCSC, stolen credentials for government and corporate systems can be used to pivot from a personal device into a secure organizational network, leading to a much larger breach.
  • Further Attacks: The stolen information can be used to conduct highly targeted and convincing spear-phishing attacks against the victim or their contacts.

Detection & Response

For individuals who received the notification or suspect infection:

  • Follow Official Guidance: Visit the NCSC's "Own Your Online" website as instructed in the official email (no-reply@comms.ncsc.govt.nz).
  • Run Antivirus Scans: Use a reputable antivirus or anti-malware solution to scan the Windows device and remove any detected threats.
  • Assume Compromise: Treat all passwords stored on the device as compromised. Immediately change the passwords for all critical accounts, starting with email, banking, and government services.
  • Enable MFA: Enable multi-factor authentication on every account that supports it. This is the most effective way to prevent stolen passwords from being used.
  • Monitor Accounts: Carefully monitor bank statements and online accounts for any suspicious activity.

Mitigation

Preventing info-stealer infections requires a combination of technical controls and user vigilance:

  1. Endpoint Protection: Use a modern antivirus or Endpoint Detection and Response (EDR) solution with behavioral analysis capabilities to detect and block info-stealer activity. This is a core D3FEND File Analysis (D3-FA) technique.
  2. Be Wary of Downloads: Do not download or run software from untrusted sources, including pirated software sites, torrents, or suspicious email attachments. This is a form of user training (M1017 - User Training).
  3. Secure Password Management: Use a dedicated password manager instead of saving passwords in the browser. This centralizes and better protects credentials.
  4. Email Security: Use email security gateways that can scan for malicious attachments and links to prevent the initial delivery of the malware.
  5. Regularly Update Software: Keep your operating system, web browser, and other software up to date to protect against vulnerabilities that malware could exploit.

Timeline of Events

1
December 9, 2025
New Zealand's NCSC begins its large-scale public email notification campaign about Lumma Stealer.
2
December 17, 2025
This article was published

MITRE ATT&CK Mitigations

Use reputable antivirus software to scan for and remove known info-stealers like Lumma.

Mapped D3FEND Techniques:

Educating users about the dangers of downloading files from untrusted sources is a key preventative measure.

Enabling MFA on all accounts is the best defense against the use of stolen credentials.

Mapped D3FEND Techniques:

Use web filters to block access to known malicious sites, cracked software repositories, and malvertising networks.

D3FEND Defensive Countermeasures

To defend against info-stealers like Lumma, organizations and individuals must employ robust File Analysis at the endpoint. This means using a next-generation antivirus (NGAV) or EDR solution that doesn't just rely on signatures but also uses heuristics and machine learning to analyze files before and during execution. For Lumma Stealer, which is often delivered via droppers or loaders, the security tool should be configured to scan all downloaded files and email attachments. It should be able to identify packed or obfuscated executables, which are common characteristics of stealers. On detection, the tool should automatically quarantine the malicious file to prevent execution, thereby stopping the infection chain before any data can be stolen. This is the first line of technical defense against this type of threat.

If a malicious file evades initial detection, Process Analysis becomes the next critical defense. An EDR tool should be configured to monitor for suspicious process behaviors characteristic of info-stealers. For Lumma, this would include a process attempting to access sensitive files like Chrome's 'Login Data' or 'Web Data' SQLite databases, or files associated with cryptocurrency wallets (e.g., wallet.dat). Create detection rules that alert when a non-browser process (e.g., an unfamiliar executable running from %APPDATA%) attempts to read from these protected locations. This behavioral detection is crucial because even if the malware's signature is unknown, its actions—accessing credential stores—are predictable and can be flagged as malicious, allowing for automated process termination and incident response.

To prevent the final stage of the attack—data exfiltration—implement strict Outbound Traffic Filtering. On corporate networks, configure firewalls and web proxies to deny all outbound traffic by default, only allowing connections to known-good destinations on necessary ports. For info-stealers like Lumma that exfiltrate data over HTTP/S or to Telegram, this can be highly effective. Use DNS filtering (DNS sinkholing) to block connections to known malicious C2 domains. For personal devices, a host-based firewall can be configured to prompt the user before allowing a new, unknown application to make an outbound network connection. While this requires user diligence, it provides a final opportunity to block the malware from sending stolen data back to the attacker, rendering the initial infection useless.

Sources & References

The Week in Breach News: December 17, 2025
Kaseya (kaseya.com) December 17, 2025
NZ cyber agency alerts thousands to malware infection
GCSB (gcsb.govt.nz) December 9, 2025
NCSC issues malware data-theft alert
Covernote (covernote.co.nz) December 17, 2025
New Zealand issues mass alert over Lumma malware risk
ChannelLife (channellife.co.nz) December 10, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Lumma StealerMalwareInfoStealerNew ZealandNCSCData TheftCredential TheftPhishing

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading