A recent report from the CTM360 intelligence firm reveals an active campaign that is taking advantage of Google's ecosystem to spread malware and take control of corporate accounts. According to the analysis published by CTM360, attackers have created thousands of groups on Google Groups and hundreds of links hosted in Google services to gain confidence and distribute tools designed to steal credentials and maintain persistent access to affected teams. You can see the full report on the CTM360 site: https: / / www.ctm360.com / reports / ninja-browser-lumma-infostealer.
Social engineering is the starting point: operators infiltrate forums and thematic groups where legitimate technical issues are discussed and publish entries that look like useful solutions or downloads, including company names and key words of the sector to give appearance of authenticity. Within these threads they place disguised links - for example, invitations to "download" supposedly specific tools for an organization - and use shorters or readdresses hosted in Docs and Drive to evade filters and hide the final delivery chain.

In Windows computers the download led to a password-protected compressed file. When decompressing, the actual volume of the file deceives the detection engines: the container can expand to almost one gigabyte, but the malicious component occupies only one fraction (according to CTM360, about 33 MB), while the rest is filled with null bytes to make it difficult to scan static. When executed, the installer rebuilds fragmented binaries and launches a component compiled with AutoIt that decrypt a load in memory. The observed behavior coincides with that of a commercial infostealer known as Lumma, which points to browser credentials and session cookies, runs shell commands and exfilters data using HTTP POST requests to control and control servers identified by researchers. CTM360 provides indicators such as associated domains and hashes that allow the detection and blocking of this infrastructure.
For Linux users the trap has another side: instead of a heavily filled ZIP, the victims are directed to install a modified Chromium browser under the brand "Ninja Browser." At first sight it promises privacy and anonymity, but in the background it integrates malicious extensions that are installed without the user's consent and hidden mechanisms to maintain the attacker's presence in the system. One of these extensions, analyzed by CTM360, acts as a tracking and handling agent: it assigns unique identifiers to users, injects scripts into web sessions, manages tabs and cookies, and downloads remote content using heavily obfuscated JavaScript.
The researchers also found programmed tasks that consult daily-controlled servers, silent update procedures and redirections to suspicious search engines, suggesting an architecture designed for future developments of the attack. The domains linked to the project include variants related to "ninja-browser," and CTM360 also lists IP addresses and a C2 domain (e.g., healgeni [.] live) that allow security teams to block and track malicious activity.
This type of campaign fits into a trend that has already documented multiple security sector actors: the abuse of legitimate platforms and cloud services to distribute malicious code reduces friction and exploits the presumption of user confidence and filters. From phishing with documents hosted on Google Drive to useful charges that rest on legitimate archiving services, the use of "trust" infrastructure complicates traditional detection; it is a pattern that has been observed in previous incidents and that security analysts have been warning in recent years, as reflected in specialized press reports and technical analysis on cloud service abuse (see for example the general follow-up on this type of attack published by KrebsOnSecurity).
From the technical point of view, the techniques used by the operators - pating of binaries to avoid analysis, reconstruction in time of execution with AutoIt and loads in memory - are not new in themselves, but their combination with the visibility it provides to accommodate elements in domains and reputed services makes them effective. Security companies like ESET have documented how AutoIt and other scripting languages are abused to pack and execute malicious loads, and therefore response teams should be attentive to performance indicators rather than static signals: WeLiveSecurity / ESET provides useful explanations about these techniques.
The consequences for organizations can be serious: the theft of credentials and session tokens facilitates the kidnapping of accounts, financial fraud and lateral movement within corporate networks, while components installed furtively can function as back doors for future operations. This is why security teams should combine technical measures and training: review redirection chains (especially those passing through Docs / Drive), block engagement indicators at firewall and EDR level, audit browser extensions and monitor the creation of scheduled tasks or unusual processes in endpoints. CTM360 suggests a similar set of actions and publishes IoC that facilitate their incorporation into detection rules; the report is available at: CTM360 - Ninja Browser & Lumma Infostealer.

To contextualize these recommendations in more general good practice, identity and access managers should review credentials protection and public account abuse detection guides, such as those provided by Microsoft in their technical identity protection documents, and apply risk-based access controls and multifactor authentication where possible. Microsoft's guidelines on defense against credentials theft and identity management are a good starting point: Microsoft - Identity Protection. In addition, users should receive practical training to recognize signs of fraud in public forums and avoid installing software from unverified sources; awareness materials and phishing exercises help reduce the likelihood of this type of lure being successful.
At the operational level, incorporating the monitoring of external threats that monitor third-party forums, pages and hosting services is increasingly necessary. Tools that detect changes in brand-related domains, the appearance of suspicious downloads or the use of legitimate services to redirect malicious traffic bring early visibility. CTM360, together with other intelligence providers, keeps up-to-date domain listings, PIs and hashes associated with the attack; its report includes data that can be integrated into blocking solutions and incident response processes.
The campaign described by CTM360, which combines a commercial infostealer with a jammed browser and a strategic use of trust services, is a reminder that modern security requires attention to both the technique and the human factor. Maintaining communication channels with security providers, quickly distributing commitment indicators and strengthening users' digital hygiene are actions that reduce the impact of such attacks. For those who want to deepen the findings and take advantage of the IoC provided by the researchers, the original report is available on the CTM360 website: https: / / www.ctm360.com / reports / ninja-browser-lumma-infostealer.
Related
More news on the same subject.

Safety alert Drug critical vulnerability of SQL injection in PostgreSQL requires immediate update
Drucal has published safety updates for a vulnerability qualified as "highly critical" which affects Drumal Core and allows an attacker to achieve arbitrary SQL injection in sit...

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...