Lumma Stealer and Ninja Browser Malware Campaign Abuses Google Groups to Target Organizations

Related

Lotus Blossom Hackers Compromised Notepad++ Hosting Infrastructure to Deliver Malware

What happened The state-sponsored threat group Lotus Blossom breached the...

Lithuania Launches National Initiative to Counter AI-Driven Cyber Fraud

What happened Lithuania has launched a government-funded national initiative aimed...

ClickFix Attack Abuses nslookup to Deliver PowerShell Malware via DNS

What happened Threat actors have introduced a new ClickFix attack...

Snail Mail Phishing Campaign Targets Trezor and Ledger Crypto Wallet Users

What happened Threat actors have launched a phishing campaign using...

Share

What happened

Security researchers at CTM360 have identified a global malware campaign abusing Google Groups and other Google-hosted services to distribute credential-stealing malware and maintain persistent access on compromised systems. Attackers infiltrate legitimate industry discussion forums and post seemingly authentic technical conversations containing malicious download links disguised as organization-specific software.  These links redirect victims through Google-hosted infrastructure and URL shorteners before delivering malware payloads tailored to the victim’s operating system. For Windows users, attackers deploy Lumma Stealer, which harvests browser credentials, session cookies, and executes commands while exfiltrating data to attacker-controlled infrastructure.  Linux users receive a trojanized Chromium-based browser called Ninja Browser, which installs malicious extensions, tracks users, manipulates browser sessions, and establishes persistent access through scheduled tasks and remote update mechanisms.  The campaign leveraged more than 4,000 malicious Google Groups and over 3,500 Google-hosted URLs to distribute malware globally. 

Who is affected

Organizations and users interacting with malicious Google Groups posts or downloading software through embedded links are affected, as the campaign enables credential theft, session hijacking, and persistent compromise across Windows and Linux systems. 

Why CISOs should care

The abuse of trusted SaaS platforms like Google Groups, Google Docs, and Google Drive demonstrates how attackers can leverage legitimate cloud services to evade traditional security controls and distribute malware at scale. 

3 practical actions

  • Block known indicators of compromise. Prevent access to malicious domains, IP addresses, and file hashes identified in the campaign. 
  • Audit browser extensions and scheduled tasks. Identify unauthorized installations and persistence mechanisms deployed by malware. 
  • Educate users on forum-based threats. Warn employees against downloading software shared through public forums or unsolicited technical discussions.Â