Hackers loosening a quiet lumma steal attack through a false telegram-premium place that automatically downloads malware and hijacks credentials without requiring click


  • Lumma Stealer Malware hides in a fake telegram premium site, launch without user click
  • Executable uses cryptor -connection to bypass most traditional antivirus -Scan techniques altogether
  • Malware connects to real telegram -servers while secretly sending stolen data to hidden domains

A malicious campaign is targeting users through a fraudulent telegram premium site that delivers a dangerous variant of Lumma Stealer Malware.

A report from Cyfirma claims the domain electram premium[.]App mimices carefully the legitimate telegram premium brand and hosts a file named start.exe.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top