Computer pirates unleash a silent lumma lumma attack through a false telegram site that automatically load malware credentials and kidnapped without requiring any click




  • Stealer Lumma malware hides in a False Premium Telegram site, which starts without user clicks
  • Executable uses the obfuscation of cryptor to avoid most of the traditional antivirus scanning techniques
  • Malware connects to real telegram servers while secretly sending stolen data to hidden domains

A malicious campaign is aimed at users through a fraudulent website of Telegram Premium, offering a dangerous variant of Lumma Stealer malware.

A Cyfirma report states that telegrampremium domain[.]The application closely mimics the legitimate brand Telegram Premium and houses a file called Start.exe.

Leave a Comment

Your email address will not be published. Required fields are marked *