How this malware operates —and why Invisia stops it completely
Santiago, May 2025
In recent weeks, multiple companies and public organizations in Chile have reported a new wave of malicious emails impersonating the SII (Internal Revenue Service) and other well-known institutions. These messages, carefully crafted, trick users into downloading ZIP or PDF files that actually contain malware. The goal: to steal sensitive information without the victim realizing it.
One of the main actors behind this campaign is Lumma Stealer, an infostealer malware distributed through phishing techniques and compromised links. While its design isn’t new, its efficiency has kept it relevant since 2022, continuously evolving and improving its evasion tactics.
The malware doesn’t just target home users—it has also been detected in corporate environments, including government networks and financial sector companies.
Lumma Stealer is an active malware threat in Chile as of 2025. It belongs to the “infostealer” family and operates under the Malware as a Service (MaaS) model.
This means that any cybercriminal can pay to use it, customize it, and distribute it through their own phishing or attack campaigns.
Once executed on a victim's system, Lumma is capable of:
Even worse: many of its variants are fileless, meaning they execute directly in memory. This evasion technique makes it one of the most complex and active malware threats affecting Chilean organizations in 2025.
The consequences can be devastating:
identity theft, financial fraud, hijacked business sessions, and even confidential data exfiltration.
Unlike traditional antivirus tools, Invisia doesn’t rely on signatures or blacklists. Its approach is behavioral, proactive, and contextual—making it a truly effective barrier against modern threats like Lumma.
Execution phase: If the infected file is downloaded to Downloads or AppData, Invisia detects the suspicious path and automatically applies icacls rules to block its execution—even if the user clicks on it.
In-memory execution phase: If it manages to run, the file is analyzed in real time. Invisia detects:
-enc, base64, IEX)winword.exe → cmd.exe)Result: the process is immediately terminated, and a visual alert is triggered for the system administrator.
Clipboard hijacking phase: Invisia already monitors clipboard activity. If it detects suspicious content being copied (tokens, passwords, credentials), it automatically replaces it with “BLOCKED BY INVISIA.”
Exfiltration phase: If the malware attempts to send data to destinations like Discord, Telegram Web, or custom domains, Invisia blocks the traffic, closes tabs, and alerts the system.
Persistence phase: If the attacker tries to leave a payload in the registry or set it to run at startup—even from a recovery environment—Invisia's dashboard detects it and reverses the changes remotely.
In summary:
Lumma Stealer doesn't survive any phase of the attack cycle when faced with Invisia.
Although Invisia can stop these attacks even if users make mistakes, it’s still essential to follow basic cybersecurity best practices: