TI Mindmap HUB
Threat Intelligence Report

Behind the Curtain: How Lumma Affiliates Operate

๐Ÿ“… October 4, 2025 ๐Ÿ“ฐ www.recordedfuture.com ๐Ÿ” 0 CVE(s) referenced

Lumma affiliates operate as agile, decentralized cybercriminal teams leveraging a sophisticated ecosystem of infostealers, anonymization tools, and underground services to run parallel scams, evade detection, and rapidly recover from law enforcement disruptions.

vendor

Sign in to access the full report including:
detailed analysis, IOCs, MITRE ATT&CK mapping, and STIX bundle.

๐Ÿ” Sign In to Read Full Report

You'll need to accept our Terms of Service to access the platform.

๐Ÿ“Š Visual Mindmap
๐ŸŽฏ IOC Extraction
โš”๏ธ MITRE ATT&CK TTPs
๐Ÿ“ฆ STIX 2.1 Bundle