Skip to content Dark Web Informer - Cyber Threat Intelligence
IOC

IOC Alert: Lumma Stealer Command-and-Control Domain Identified

📖 Overview

A domain has been identified hosting infrastructure associated with the Lumma information stealer malware family. The site currently resolves to an active IP and is registered with Let’s Encrypt certificates. Confidence in this attribution is assessed at 100%.


📌 Key Details

FieldInformation
TypeDomain
Indicatorholdonz[.]pics
Threat TypeBotnet C2
Malwarewin.lumma
Confidence100%
Date30 Sep 2025 – 14:04:52 UTC
Tagsc2, domain, Lumma, stealer
ReporterDonPasci
ReferenceNone

🔎 URLScan Result


📡 Domain & Certificate Info

  • DNS A Record: 164[.]90[.]129[.]126
  • Recent Certificates:
    • C=US, O=Let's Encrypt, CN=R12 (Valid: 2025-09-22 → 2025-12-21)
    • C=US, O=Let's Encrypt, CN=R12 (Valid: 2025-09-22 → 2025-12-21)
    • C=US, O=Let's Encrypt, CN=R12 (Valid: 2025-09-22 → 2025-12-21)


🛡️ Defensive Guidance

  • Block holdonz[.]pics and its associated IP (164[.]90[.]129[.]126) at DNS, proxy, and endpoint levels.
  • Monitor for traffic patterns consistent with Lumma stealer C2 communication.
  • Hunt for indicators of compromise such as suspicious exfiltration activity from Windows endpoints.
  • Add Lumma-related domains to detection watchlists and track new registrations using certificate transparency logs.

⚠️ This IOC underscores the persistent use of cheap, quickly registered domains to support Lumma stealer operations, leveraging Let’s Encrypt certificates for legitimacy.

Latest