CTM360: Lumma Stealer and Ninja Browser malware campaign abusing Google Groups

Published: (February 15, 2026 at 11:30 AM EST)
5 min read

Source: Bleeping Computer

![CTM360 Report Banner](https://www.bleepstatic.com/content/posts/2026/02/12/CTM360-REPORT-BANNER.jpg)

# CTM360 Threat Report

**Key Findings**

- **4,000+ malicious Google Groups** are being leveraged in an active malware campaign.  
- **3,500+ Google‑hosted URLs** are used to deliver credential‑stealing payloads.  
- Attackers exploit Google’s trusted ecosystem to **distribute malware** and **maintain persistent access** on compromised devices.  
- The campaign is **global**; threat actors embed specific organization names and industry‑relevant keywords in posts to increase credibility and drive downloads.

**Impact**

- Organizations worldwide are at risk of credential theft and long‑term compromise.  
- The use of legitimate Google services helps the malware evade traditional security controls.

**Read the full report**

[CTM360 – Ninja Browser / Lumma Infostealer Report](https://www.ctm360.com/reports/ninja-browser-lumma-infostealer)

How the Campaign Works

The attack chain starts with social engineering inside Google Groups. Threat actors infiltrate industry‑related forums and post technical discussions that appear legitimate, covering topics such as:

  • Network issues
  • Authentication errors
  • Software configurations

Within these threads, attackers embed download links disguised as:

Download {Organization_Name} for Windows 10

Delivery Mechanism

  • URL shorteners or Google‑hosted redirectors (Docs/Drive) are used to hide the final destination.
  • The redirector detects the victim’s operating system and serves different payloads for Windows or Linux machines.

Malware lifecycle diagram
Figure: Malware lifecycle for the Lummastealer/NinjaBrowser campaign

Windows Infection Flow: Lumma Info‑Stealer

For Windows users, the campaign delivers a password‑protected compressed archive hosted on a malicious file‑sharing infrastructure.

Oversized archive to evade detection

The archive decompresses to ≈ 950 MB, while the actual malicious payload is only ≈ 33 MB.
CTM360 researchers discovered that the executable is padded with null bytes—a technique used to:

  • Exceed antivirus file‑size scanning thresholds.
  • Disrupt static‑analysis engines.

AutoIt‑based reconstruction

When the archive is executed, the malware:

  1. Reassembles segmented binary files.
  2. Launches an AutoIt‑compiled executable.
  3. Decrypts and runs a memory‑resident payload.

The observed behavior matches Lumma Stealer, a commercially sold infostealer frequently used in credential‑harvesting campaigns.

Observed behavior

  • Browser credential exfiltration.
  • Session‑cookie harvesting.
  • Shell‑based command execution.
  • HTTP POST requests to C2 infrastructure (e.g., healgeni[.]live).
  • Use of multipart/form‑data POST requests to mask exfiltrated content.

CTM360 identified multiple associated IP addresses and SHA‑256 hashes linked to the Lumma‑stealer payload.

Linux Infection Flow: Trojanized “Ninja Browser”

Linux users are redirected to download a trojanized Chromium‑based browser branded “Ninja Browser.”
The software advertises itself as a privacy‑focused browser with built‑in anonymity features, but CTM360’s analysis shows that it:

  • Silently installs malicious extensions without user consent.
  • Implements hidden persistence mechanisms that enable future compromise by the threat actor.

Malicious extension behavior

A built‑in extension named “NinjaBrowserMonetisation” was observed to:

  • Track users via unique identifiers.
  • Inject scripts into web sessions.
  • Load remote content.
  • Manipulate browser tabs and cookies.
  • Store data externally.

The extension contains heavily obfuscated JavaScript that uses XOR and a Base56‑like encoding. While not all embedded domains are currently active, the infrastructure suggests future payload‑deployment capability.

The installed extensions by the threat actor to the browser (server‑side view)
The installed extensions by the threat actor to the browser (server‑side view).
Source: CTM360


Silent persistence mechanism

CTM360 also identified scheduled tasks configured to:

  • Poll attacker‑controlled servers daily.
  • Silently install updates without user interaction.
  • Maintain long‑term persistence.

Researchers also noted that the browser defaults to a Russian‑based search engine named “X‑Finder” and redirects to another suspicious AI‑themed search page.


Associated infrastructure

The campaign appears tied to the following domains:

  • ninja-browser[.]com
  • nb-download[.]com
  • nbdownload[.]space

Campaign Infrastructure & Indicators of Compromise

CTM360 linked the activity to the following infrastructure:

IP Addresses

  • 152.42.139[.]18
  • 89.111.170[.]100

C2 Domain

  • healgeni[.]live

Note: Multiple SHA‑256 hashes and additional domains associated with credential‑harvesting and info‑stealer distribution are detailed in the full report.

Risks to organizations

Lumma Stealer risks

  • Credential and session token theft
  • Account takeover
  • Financial fraud
  • Lateral movement in enterprise environments

Ninja Browser risks

  • Silent credential harvesting
  • Remote command execution
  • Backdoor‑like persistence
  • Automatic malicious updates without user consent

Note: Because the campaign abuses Google‑hosted services, the attack bypasses traditional trust‑based filtering mechanisms and increases user confidence in malicious content.

Defensive recommendations

  • Inspect shortened URLs and Google Docs/Drive redirect chains.
  • Block the IoCs at firewall and EDR levels.
  • Educate users against downloading software from public forums/sources without verification.
  • Monitor scheduled task creation on endpoints.
  • Audit browser extension installations.

The campaign highlights a broader trend: attackers are increasingly weaponizing trusted SaaS platforms as delivery infrastructure to evade detection.

About the Research

The findings were published in CTM360’s February 2026 threat‑intelligence report, “Ninja Browser & Lumma Infostealer Delivered via Weaponized Google Services.”

CTM360 continues to monitor this activity and track related infrastructure.

Read the full report:
CTM360 – Ninja Browser & Lumma Infostealer Report

Detect Cyber Threats 24/7 with CTM360

Monitor, analyze, and promptly mitigate risks across your external digital landscape with CTM360.

Join our Community Edition

Sponsored and written by CTM360.

0 views
Back to Blog

Related posts

Read more »