Increase in Lumma Stealer Activity Coincides with Use of Adaptive Browser Fingerprinting TacticsIn this blog entry, Trendâ„¢ Research analyses the layered command-and-control approaches that Lumma Stealer uses to maintain its ongoing operations while enhancing collection of victim-environment data.
Source:
Increase in Lumma Stealer Activity Coincides with Use of Adaptive Browser Fingerprinting Tactics