Close Menu
TechUpdateAlert

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    A flexible and secure password manager for Android

    August 17, 2025

    Top 10 trending phones of week 33

    August 17, 2025

    Today’s NYT Connections Hints, Answers for Aug. 18, #799

    August 17, 2025
    Facebook X (Twitter) Instagram
    Trending
    • A flexible and secure password manager for Android
    • Top 10 trending phones of week 33
    • Today’s NYT Connections Hints, Answers for Aug. 18, #799
    • Cars have had real-life DLC for a while, but now Volkswagen’s gone full pay to win, locking a car’s max horsepower behind a subscription
    • Hackers unleash a silent Lumma Stealer attack through a fake Telegram Premium site that auto-downloads malware and hijacks credentials without requiring any clicking
    • Best Senior Phone Plans of 2025
    • I Prefer the Merlin Bird ID App Over Meditation Apps for Staying in the Present Moment
    • Blackview BV7300 rugged phone review
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechUpdateAlertTechUpdateAlert
    • Home
    • Gaming
    • Laptops
    • Mobile
    • Software
    • Reviews
    • AI & Tech
    • Gadgets
    • How-To
    TechUpdateAlert
    Home»How-To»Hackers unleash a silent Lumma Stealer attack through a fake Telegram Premium site that auto-downloads malware and hijacks credentials without requiring any clicking
    How-To

    Hackers unleash a silent Lumma Stealer attack through a fake Telegram Premium site that auto-downloads malware and hijacks credentials without requiring any clicking

    techupdateadminBy techupdateadminAugust 17, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    The Telegram logo appears on the screen of a smartphone that rests on top of a laptop keyboard
    Share
    Facebook Twitter LinkedIn Pinterest Email


    • Lumma Stealer malware hides in a fake Telegram Premium site, launching without user clicks
    • Executable uses cryptor obfuscation to bypass most traditional antivirus scanning techniques entirely
    • Malware connects to real Telegram servers while secretly sending stolen data to hidden domains

    A malicious campaign is targeting users through a fraudulent Telegram Premium website, delivering a dangerous variant of the Lumma Stealer malware.

    A report from Cyfirma claims the domain telegrampremium[.]app closely mimics the legitimate Telegram Premium brand and hosts a file named start.exe.

    This executable, built in C/C++, is automatically downloaded upon visiting the site, requiring no user interaction.


    You may like

    A closer look at the malware delivery

    Once executed, it harvests sensitive data, including browser-stored credentials, cryptocurrency wallet details, and system information, increasing risks such as identity theft.

    The fake site operates as a drive-by download mechanism, a method where malicious payloads are delivered automatically without explicit consent.

    The high entropy of the executable suggests the use of a cryptor for obfuscation, which complicates detection by traditional security suites.

    Static analysis shows that the malware imports numerous Windows API functions, enabling it to manipulate files, modify the registry, access the clipboard, execute additional payloads, and evade detection.

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    The malware also initiates DNS queries via Google’s public DNS server, circumventing internal network controls.

    It communicates with both legitimate services like Telegram and Steam Community for possible command-and-control purposes and with algorithmically generated domains to evade domain takedowns.

    These techniques allow the malware to maintain communication channels while avoiding detection by firewalls and conventional monitoring tools.

    The domain involved is newly registered, with hosting characteristics suggesting it was set up for short-lived, targeted activity.

    The malware drops multiple disguised files in the %TEMP% directory, including encrypted payloads masquerading as image files.

    Some are later renamed and executed as obfuscated scripts, enabling the malware to clean its traces.

    It uses functions like Sleep to delay execution and LoadLibraryExW to stealthily load DLLs, making it more difficult for analysts to detect its presence during initial inspection.

    Staying safe from threats of this nature requires a combination of technical measures and user awareness.

    How to stay safe

    • Organizations should implement endpoint detection and response solutions capable of identifying suspicious behavior patterns associated with Lumma Stealer
    • Block all access to malicious domains
    • Enforce strict download controls to prevent payload delivery
    • Multi-factor authentication is essential to limit damage if credentials are compromised
    • Regular credential rotation helps reduce the risk of long-term access by attackers
    • Continuous monitoring for suspicious activity allows faster detection and response to potential breaches

    You might also like

    attack autodownloads clicking credentials fake Hackers hijacks Lumma malware Premium requiring silent Site Stealer Telegram unleash
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleBest Senior Phone Plans of 2025
    Next Article Cars have had real-life DLC for a while, but now Volkswagen’s gone full pay to win, locking a car’s max horsepower behind a subscription
    techupdateadmin
    • Website

    Related Posts

    How-To

    A flexible and secure password manager for Android

    August 17, 2025
    How-To

    Think You’re Helping by Crushing Cans? You Could Be Dooming Them Instead

    August 17, 2025
    How-To

    Gmail’s missing privacy feature finally solved

    August 17, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Apple Pencil With ‘Trackball’ Tip, Ability to Draw on Any Surface Described in Patent Document

    July 9, 20253 Views

    Samsung Galaxy Z Fold 7 and Galaxy Z Flip 7: First Impressions

    July 9, 20253 Views

    The Bezos-funded climate satellite is lost in space

    July 9, 20252 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Best Fitbit fitness trackers and watches in 2025

    July 9, 20250 Views

    There are still 200+ Prime Day 2025 deals you can get

    July 9, 20250 Views

    The best earbuds we’ve tested for 2025

    July 9, 20250 Views
    Our Picks

    A flexible and secure password manager for Android

    August 17, 2025

    Top 10 trending phones of week 33

    August 17, 2025

    Today’s NYT Connections Hints, Answers for Aug. 18, #799

    August 17, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact us
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    © 2025 techupdatealert. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.