{"id":10278,"date":"2024-12-10T11:17:48","date_gmt":"2024-12-10T11:17:48","guid":{"rendered":"\/cybersecurity-blog\/?p=10278"},"modified":"2025-03-31T08:56:20","modified_gmt":"2025-03-31T08:56:20","slug":"manufacturing-companies-targeted-with-lumma","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/manufacturing-companies-targeted-with-lumma\/","title":{"rendered":"Manufacturing Companies Targeted with New Lumma and Amadey Campaign"},"content":{"rendered":"\n<p>The manufacturing industry has long been a target of cybercriminals. While data encryption has been a prevalent tactic in recent years, threat actors are now increasingly focusing on stealing sensitive information and gaining control over critical infrastructure.&nbsp;&nbsp;<\/p>\n\n\n\n<p>One of the latest <a href=\"https:\/\/cyble.com\/blog\/threat-actor-targets-manufacturing-industry-with-malware\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">campaigns<\/a> on record involves the use of <a href=\"https:\/\/any.run\/malware-trends\/lumma\" target=\"_blank\" rel=\"noreferrer noopener\">Lumma<\/a> and <a href=\"https:\/\/any.run\/malware-trends\/amadey\" target=\"_blank\" rel=\"noreferrer noopener\">Amadey<\/a> malware.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Campaign Uses Fake LogicalDOC URLs&nbsp;&nbsp;<\/h2>\n\n\n\n<p>This campaign heavily leverages Living Off the Land (LOLBAS) techniques to deliver malware as part of its operations.&nbsp;<\/p>\n\n\n\n<p>Threat actors distribute phishing emails with URLs leading targets to download LNK files disguised as PDFs. These files are accessed via a domain name masquerading as one belonging to LogicalDOC, a service for managing documentation widely utilized in the manufacturing industry.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Attack Involves Scripts to Aid Infection&nbsp;&nbsp;<\/h2>\n\n\n\n<p>The malicious LNK file, once activated, initiates <a href=\"https:\/\/any.run\/cybersecurity-blog\/powershell-script-tracer\/\" target=\"_blank\" rel=\"noreferrer noopener\">PowerShell<\/a> via an ssh.exe command. Following a chain of scripts, a CPL file is downloaded from berb[.]fitnessclub-filmfanatics[.]com as a ZIP archive.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The malware utilizes both PowerShell and Windows Management Instrumentation (WMI) commands to collect detailed information about the victim\u2019s system. This includes: &nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Data such as language settings&nbsp;<\/li>\n\n\n\n<li>Antivirus software&nbsp;<\/li>\n\n\n\n<li>Operating system versions&nbsp;<\/li>\n\n\n\n<li>Hardware specifications&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>This reconnaissance allows attackers to tailor subsequent attacks and enhances their credibility when sending follow-up malicious emails within the targeted organization.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">DLL Sideloading Ensures Evasion&nbsp;&nbsp;<\/h2>\n\n\n\n<p>Attackers run malicious code in memory without leaving traces and abuse standard Windows tools to blend in with regular system activities. The downloaded ZIP file contains several malicious files used to carry out DLL sideloading. &nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Key Objective<\/h2>\n\n\n\n<p>The primary purpose of this attack is to: <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Steal important information with Lumma Stealer<\/li>\n\n\n\n<li>Maintain control over the infected systems with Amadey Bot<\/li>\n<\/ul>\n\n\n\n<p>Attackers gain the ability to continuously monitor and manipulate their targets, which poses a significant threat to manufacturing businesses.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why Businesses Need to Pay Attention&nbsp;<\/h2>\n\n\n\n<p>For manufacturing companies, the consequences of such attacks can be severe and include: &nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Theft of intellectual property&nbsp;<\/li>\n\n\n\n<li>Disruption of operations&nbsp;<\/li>\n\n\n\n<li>Financial losses and compliance violations&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Understanding and preparing for these threats is crucial for protecting valuable assets, maintaining operational integrity, and ensuring the safety of employees and customers.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Analysis of the Attack&nbsp;with ANY.RUN Sandbox<\/h2>\n\n\n\n<p>To proactively identify malicious files belonging to this and other malware attacks, analyze them in the safe environment of <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=lumma_targets_manufacturing&amp;utm_term=101224&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN\u2019s Interactive Sandbox<\/a> that offers:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Real-time Insights: <\/strong>In-depth view of malicious activities as they occur.&nbsp;<\/li>\n\n\n\n<li><strong>Interactivity: <\/strong>Test threat responses in a live system.&nbsp;<\/li>\n\n\n\n<li><strong>Comprehensive Reporting: <\/strong>Detailed reports on IOCs, malware families, and more.&nbsp;<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"578\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/1image-1024x578.png\" alt=\"\" class=\"wp-image-10279\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/1image-1024x578.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/1image-300x169.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/1image-768x434.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/1image-1536x868.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/1image-370x209.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/1image-270x153.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/1image-740x418.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/1image.png 1859w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Analysis of a malicious LNK file inside ANY.RUN&#8217;s Sandbox<\/em> <\/figcaption><\/figure><\/div>\n\n\n<p>By uploading a malicious LNK file to the sandbox and executing it we can observe how the&nbsp;entire chain of infection plays out.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/11a68474-4e9a-4070-9b23-b8d244c9fc02\" target=\"_blank\" rel=\"noreferrer noopener\">View analysis session<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"822\" height=\"599\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/2image.png\" alt=\"\" class=\"wp-image-10280\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/2image.png 822w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/2image-300x219.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/2image-768x560.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/2image-370x270.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/2image-270x197.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/2image-740x539.png 740w\" sizes=\"(max-width: 822px) 100vw, 822px\" \/><figcaption class=\"wp-element-caption\"><em>ANY.RUN detects activities related to malicious and suspicious process<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>First, the .lnk file initiates SSH, which starts PowerShell.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"847\" height=\"700\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/3image.png\" alt=\"\" class=\"wp-image-10281\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/3image.png 847w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/3image-300x248.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/3image-768x635.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/3image-370x306.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/3image-270x223.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/3image-740x612.png 740w\" sizes=\"(max-width: 847px) 100vw, 847px\" \/><figcaption class=\"wp-element-caption\"><em>Mshta is utilized to download a payload from remote server<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>PowerShell then launches Mshta with the AES-encrypted first-stage payload that it decrypts and executes.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"756\" height=\"732\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/4image.png\" alt=\"\" class=\"wp-image-10282\" style=\"width:650px;height:auto\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/4image.png 756w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/4image-300x290.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/4image-370x358.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/4image-270x261.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/4image-740x717.png 740w\" sizes=\"(max-width: 756px) 100vw, 756px\" \/><figcaption class=\"wp-element-caption\"><em>Attack uses Emmenhtal loader to facilitate infection<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>PowerShell executes an AES-encrypted command to decrypt and run <a href=\"https:\/\/any.run\/malware-trends\/emmenhtal\" target=\"_blank\" rel=\"noreferrer noopener\">Emmenhtal<\/a>.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"575\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/5image-1024x575.png\" alt=\"\" class=\"wp-image-10283\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/5image-1024x575.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/5image-300x169.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/5image-768x432.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/5image-1536x863.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/5image-370x208.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/5image-270x152.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/5image-740x416.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/5image.png 1824w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Suricata IDS is used in ANY.RUN to identify Amadey-related traffic<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>Emmental leads to system infections with Lumma and Amadey as a result.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nStrengthen your company&#8217;s security <br>with ANY.RUN&#8217;s <span class=\"highlight\">Interactive Sandbox<\/span>&nbsp;   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=lumma_targets_manufacturing&#038;utm_term=101224&#038;utm_content=linktodemo\" rel=\"noopener\" target=\"_blank\">\nGet free trial\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">Collect Threat Intelligence on Lumma and Amadey Attacks&nbsp;<\/h2>\n\n\n\n<p>With <a href=\"https:\/\/any.run\/cybersecurity-blog\/introducing-any-run-threat-intelligence-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">TI Lookup<\/a>, ANY.RUN\u2019s searchable database of the latest threat intelligence, you can find more info on malware and phishing campaigns. TI Lookup provides:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Fresh Data<\/strong>: Latest samples from a global network of security professionals.&nbsp;<\/li>\n\n\n\n<li><strong>Actionable Indicators<\/strong>: IOCs from traffic, memory dumps, and manual collection.&nbsp;<\/li>\n\n\n\n<li><strong>Contextual Information<\/strong>: Links to full sandbox analysis sessions with detailed data.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Use the following query, consisting of the name of the threat and the path to one of the malicious files used in the attack, for your search:&nbsp;<\/p>\n\n\n\n<div class=\"wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper\n\"\n    >\n        <table id=\"wpdtSimpleTable-213\"\n           style=\"border-collapse:collapse;\n                   border-spacing:0px;\"\n           class=\"wpdtSimpleTable wpDataTable\"\n           data-column=\"1\"\n           data-rows=\"1\"\n           data-wpID=\"213\"\n           data-responsive=\"0\"\n           data-has-header=\"0\">\n\n                    <tbody>        <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A1\"\n                    data-col-index=\"0\"\n                    data-row-index=\"0\"\n                    style=\" width:100%;                    padding:10px;\n                    \"\n                    >\n                                        <a class=\"wpdt-link-content\" style=\"color: #009cff; text-decoration: underline\" href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=psloryama_analysis&amp;utm_term=271124&amp;utm_content=linktolookup#%7B%2522query%2522:%2522filePath:%255C%2522dbghelp.dll%255C%2522%2520AND%2520threatName:%255C%2522lumma%255C%2522%2522,%2522dateRange%2522:180%7D%20\"  rel=\"\" target=\"_blank\" data-cell-id=\"00\" data-link-url=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=psloryama_analysis&amp;utm_term=271124&amp;utm_content=linktolookup#%7B%2522query%2522:%2522filePath:%255C%2522dbghelp.dll%255C%2522%2520AND%2520threatName:%255C%2522lumma%255C%2522%2522,%2522dateRange%2522:180%7D%20\" data-link-text=\"filePath:&quot;dbghelp.dll&quot; AND threatName:&quot;lumma&quot;\" data-link-target=\"true\" data-link-nofollow=\"0\" data-link-noreferrer=\"0\" data-link-sponsored=\"0\" data-link-btn-status=\"0\" data-link-btn-class=\"\" data-link-content=\"wpdt-link-content\">filePath:&quot;dbghelp.dll&quot; AND threatName:&quot;lumma&quot;<\/a>                    <\/td>\n                                        <\/tr>\n                    <\/table>\n<\/div><style id='wpdt-custom-style-213'>\ntable#wpdtSimpleTable-213{ table-layout: fixed !important; }\ntable#wpdtSimpleTable-213 td, table.wpdtSimpleTable213 th { white-space: normal !important; }\n<\/style>\n\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"599\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/6image-1024x599.png\" alt=\"\" class=\"wp-image-10285\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/6image-1024x599.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/6image-300x175.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/6image-768x449.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/6image-1536x898.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/6image-370x216.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/6image-270x158.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/6image-740x433.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/6image.png 1847w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>TI Lookup lets you collect threat data and view relevant sandbox sessions<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>The service provides a list of files matching the query along with sandbox sessions featuring analysis of samples belonging to the same campaign that you can explore in detail.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nCollect information on the latest cyber attacks <br>with <span class=\"highlight\">TI Lookup<\/span>&nbsp;   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/intelligence.any.run\/plans\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=lumma_targets_manufacturing&#038;utm_term=101224&#038;utm_content=linktotiplans\" rel=\"noopener\" target=\"_blank\">\nGet free trial\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN&nbsp;&nbsp;<\/h2>\n\n\n\n<p>ANY.RUN helps more than 500,000 cybersecurity professionals worldwide. Our&nbsp;<a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=lumma_targets_manufacturing&amp;utm_term=101224&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">interactive sandbox<\/a>&nbsp;simplifies malware analysis of threats that target both Windows and&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/linux-malware-analysis-cases\/\" target=\"_blank\" rel=\"noreferrer noopener\">Linux<\/a>&nbsp;systems. Our threat intelligence products,&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/introducing-any-run-threat-intelligence-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">TI Lookup<\/a>,&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/yara-search\/\" target=\"_blank\" rel=\"noreferrer noopener\">YARA Search<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/ti-feeds-integration\/\" target=\"_blank\" rel=\"noreferrer noopener\">Feeds<\/a>, help you find&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/indicators-of-compromise\/\" target=\"_blank\" rel=\"noreferrer noopener\">IOCs<\/a>&nbsp;or files to learn more about the threats and respond to incidents faster.&nbsp;&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The manufacturing industry has long been a target of cybercriminals. While data encryption has been a prevalent tactic in recent years, threat actors are now increasingly focusing on stealing sensitive information and gaining control over critical infrastructure.&nbsp;&nbsp; One of the latest campaigns on record involves the use of Lumma and Amadey malware.&nbsp; Campaign Uses Fake [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":10304,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[57,10,34,40],"class_list":["post-10278","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-anyrun","tag-cybersecurity","tag-malware-analysis","tag-malware-behavior"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Manufacturing Companies Targeted with New Lumma Campaign<\/title>\n<meta name=\"description\" content=\"See how attackers are targeting manufacturing companies to steal sensitive information and gain control over critical infrastructure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/manufacturing-companies-targeted-with-lumma\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/manufacturing-companies-targeted-with-lumma\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/manufacturing-companies-targeted-with-lumma\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Manufacturing Companies Targeted with New Lumma and Amadey Campaign\",\"datePublished\":\"2024-12-10T11:17:48+00:00\",\"dateModified\":\"2025-03-31T08:56:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/manufacturing-companies-targeted-with-lumma\/\"},\"wordCount\":814,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"malware analysis\",\"malware behavior\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/manufacturing-companies-targeted-with-lumma\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/manufacturing-companies-targeted-with-lumma\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/manufacturing-companies-targeted-with-lumma\/\",\"name\":\"Manufacturing Companies Targeted with New Lumma Campaign\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2024-12-10T11:17:48+00:00\",\"dateModified\":\"2025-03-31T08:56:20+00:00\",\"description\":\"See how attackers are targeting manufacturing companies to steal sensitive information and gain control over critical infrastructure.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/manufacturing-companies-targeted-with-lumma\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/manufacturing-companies-targeted-with-lumma\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/manufacturing-companies-targeted-with-lumma\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Manufacturing Companies Targeted with New Lumma and Amadey Campaign\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Manufacturing Companies Targeted with New Lumma Campaign","description":"See how attackers are targeting manufacturing companies to steal sensitive information and gain control over critical infrastructure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/manufacturing-companies-targeted-with-lumma\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/manufacturing-companies-targeted-with-lumma\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/manufacturing-companies-targeted-with-lumma\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Manufacturing Companies Targeted with New Lumma and Amadey Campaign","datePublished":"2024-12-10T11:17:48+00:00","dateModified":"2025-03-31T08:56:20+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/manufacturing-companies-targeted-with-lumma\/"},"wordCount":814,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","malware analysis","malware behavior"],"articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/manufacturing-companies-targeted-with-lumma\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/manufacturing-companies-targeted-with-lumma\/","url":"https:\/\/any.run\/cybersecurity-blog\/manufacturing-companies-targeted-with-lumma\/","name":"Manufacturing Companies Targeted with New Lumma Campaign","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2024-12-10T11:17:48+00:00","dateModified":"2025-03-31T08:56:20+00:00","description":"See how attackers are targeting manufacturing companies to steal sensitive information and gain control over critical infrastructure.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/manufacturing-companies-targeted-with-lumma\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/manufacturing-companies-targeted-with-lumma\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/manufacturing-companies-targeted-with-lumma\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/any.run\/cybersecurity-blog\/category\/news\/"},{"@type":"ListItem","position":3,"name":"Manufacturing Companies Targeted with New Lumma and Amadey Campaign"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/10278"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=10278"}],"version-history":[{"count":30,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/10278\/revisions"}],"predecessor-version":[{"id":12412,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/10278\/revisions\/12412"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/10304"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=10278"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=10278"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=10278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}