Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Dual-Purpose Luxy Malware Steals Data and Locks Your Files
Newsletter
Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Dual-Purpose Luxy Malware Steals Data and Locks Your Files
Newsletter
Search
  • Latest Stories
  • Security & Tech
    • Security
    • Vulnerabilities
    • Dark Web
    • Technology
    • Privacy
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
© MRS Media Company. Hackerdose LLC. All Rights Reserved.

Security » Dual-Purpose Luxy Malware Steals Data and Locks Your Files

Security

Dual-Purpose Luxy Malware Steals Data and Locks Your Files

A newly discovered Luxy malware combines both data-stealing and file-encrypting ransomware capabilities.

Marco Rizal
Last updated: September 5, 2024 5:32 am
By Marco Rizal - Editor, Journalist 3 Min Read
Share
Dual Purpose Luxy Malware Steals Data and Locks Your Files
SHARE

A dangerous malware dubbed Luxy was discovered, combining two destructive activities: stealing sensitive data and encrypting files for ransom.

The malware steals user passwords, browser details, cryptocurrency wallet information, and even gaming session files, and it also functions as ransomware, locking victims' files until a ransom is paid.

First discovered by K7 Labs, Luxy employs multiple modules that collaborate to infect and compromise systems.

Once installed, it searches for browser credentials and cookies, cryptocurrency wallet data, and even Minecraft and Roblox gaming session files.

image 16
Script for collecting credentials (Credit: K7 Labs)

This stolen data is stored in files that the malware stealthily collects and sends to the attackers.

The malware works by first determining whether it is running on a virtual machine (VM).

If it detects certain blacklisted systems or monitoring tools, it shuts down to avoid detection.

Luxy ensures that it can only run once per system by registering a unique identifier (mutex) and confirming internet access.

The stealer component is extremely effective at collecting data, specifically targeting browsers such as Chrome to steal cookies and passwords.

It also targets popular cryptocurrency wallets like Ethereum, Coinomi, and Exodus, as well as gaming session files from Minecraft and Roblox.

image 17
Script for collecting crypto from wallets (Credit: K7 Labs)

This stolen information can be used for more malicious purposes, such as identity theft and account takeovers.

After the stealing phase is completed, the ransomware module takes over. Luxy encrypts files on the victim's computer with AES256 and renames them with the “.luxy” extension.

For example, a file called “1.jpg” becomes “1.jpg.luxy.” After encrypting all files, Luxy sends a ransom note instructing victims to join a Discord server and pay for a decryption tool.

image 18
Luxy ransomware read me note (Credit: K7 Labs)

As in typical ransomware fashion, Luxy demands $980 to decrypt the files.

However, if victims contact the attackers within 72 hours, the cost is reduced by 50% to $490.

This creates a sense of urgency for victims to pay promptly in order to recover their files.

Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Subscribe to our newsletter

Receive the latest news and stories straight to your inbox.

Latest stories

Bitcoin Holds at $85K as Global Trade Tensions and Fed Speculation Unfold

April 15, 2025

Michael Saylor Doubles Down on Bitcoin (BTC) with $285M Investment Amid Global Uncertainty

April 14, 2025

Mantra Faces Crisis After OM Token Crashes 90% in a Day

April 14, 2025

Solana (SOL) on the Verge of a Breakout: Could $300 Be the Next Target?

April 14, 2025

You might also like

Malicious Chrome Extension Draining Solana DeFi Users Funds

Malicious Chrome Extension Draining Solana DeFi Users’ Funds

Kubota Announces Data Breach Affecting 60000 Personal Information Records

Kubota Announces Data Breach Affecting 60,000 Personal Records

U.S. Government Cracks Down On Commercial Spyware Vendors

U.S. Government Cracks Down On Commercial Spyware Vendors

Hackers Exploit WordPress Sites to Spread New Trojan

Hackers Exploit WordPress Sites to Spread New Trojan

Newsletter

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site

Quick Links

  • Contact Us
  • Search
  • Malware
  • Downloads

Company

  • About Us
  • Terms and Conditions
  • Cookies Policy
  • Privacy Policy
Advertise with us

Socials

Follow Us

© 2025 | HackerDose Media Company – All Rights Reserved

Welcome Back!

Sign in to your account

Lost your password?