Hacker trap: Fake OnlyFans tool backstabs cybercriminals, steals passwords

Share:

Hackers are targeting other hackers with a fake OnlyFans tool that claims to help steal accounts but instead infects threat actors with the Lumma stealer information-stealing malware.

The operation, discovered by Veriti Research, constitutes a characteristic example of the blurred lines between being a predator or prey in the world of cybercrime, where ironic twists and backstabs are abundant.

“Checking” into a Lumma infection

OnlyFans is an extremely popular subscription-based adult content platform where creators can earn money from users (referred to as “fans”) who pay for access to their content.

Creators can share videos, images, messages, and live streams with their subscribers, while subscribers pay a recurring fee or one-time payments for exclusive content.

Given its popularity, OnlyFans accounts often become targets of threat actors who attempt to hijack them to steal fan payments, extort the account owner to pay a ransom, or simply leak private photos.

Checker tools are designed to help validate large sets of stolen login credentials (usernames and passwords), checking if the login details match any OnlyFans accounts and whether they’re still valid.

Without those tools, cybercriminals would have to manually test out thousands of credential pairs, an impractical and tedious process that would render the scheme nonviable.

However, these tools are commonly created by other cybercriminals, causing hackers to trust that they are safe to use, and in some cases, this backfires.

Veriti discovered a case of an OnlyFans checker promising to verify credentials, check account balances, verify payment methods, and determine creator privileges but instead installed the Lumma information-stealing malware.

The payload, named “brtjgjsefd.exe,” is fetched from a GitHub repository and loaded into the victim’s computer.

Lumma is an information-stealing malware-as-a-service (MaaS) that has been rented to cybercriminals since 2022 for $250-$1000/month and distributed via various means, including malvertising, YouTube comments, torrents, and, more recently, GitHub comments.

It is an advanced information stealer with innovative evasion mechanisms and the ability to restore expired Google session tokens. It is mostly known for stealing two-factor authentication codes, cryptocurrency wallets, and passwords, cookies, and credit cards stored on a victim’s browser and file system.

Lumma also doubles as a loader itself, capable of introducing additional payloads onto the compromised system and executing PowerShell scripts.

A broader deception operation

Veriti found that when the Lumma Stealer payload is launched, it will connect to a GitHub account under the name “UserBesty,” which the cybercriminal behind this campaign uses to host other malicious payloads.

Specifically, the GitHub repository contains executables that resemble checkers for Disney+ accounts, Instagram, and a supposed Mirai botnet builder:

  • Disney+ account thieves are targeted with “DisneyChecker.exe”
  • Instagram hackers are lured by “InstaCheck.exe”
  • Wannabe botnet creators are lured with “ccMirai.exe”
ADVERTISING

Digging deeper into the malware’s communications, Veriti’s researchers found a set of “.shop” domains that acted as command and control (C2) servers, sending commands to Lumma and receiving the exfiltrated data.

This campaign is not the first time threat actors have targeted other cybercriminals in malicious attacks.

In March 2022, hackers targeted hackers with clipboard stealers disguised as cracked RATs and malware-building tools to steal cryptocurrency.

Later that year, a malware developer backdoored their own malware to steal credentials, cryptocurrency wallets, and VPN account data from other hackers.

Bill Toulas

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
10:28 pm, Jun 22, 2025
weather icon 20°C
L: 18° | H: 21°
few clouds
Humidity: 67 %
Pressure: 1011 mb
Wind: 12 mph SW
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 20%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 4:43 am
Sunset: 9:21 pm
DailyHourly
Daily ForecastHourly Forecast
Tomorrow 10:00 pm
weather icon
18° | 21°°C 0.66 mm 66% 14 mph 77 % 1016 mb 0 mm/h
Tue Jun 24 10:00 pm
weather icon
13° | 24°°C 0.2 mm 20% 14 mph 81 % 1016 mb 0 mm/h
Wed Jun 25 10:00 pm
weather icon
16° | 28°°C 0 mm 0% 11 mph 88 % 1014 mb 0 mm/h
Thu Jun 26 10:00 pm
weather icon
17° | 25°°C 1 mm 100% 15 mph 84 % 1018 mb 0 mm/h
Fri Jun 27 10:00 pm
weather icon
15° | 28°°C 0 mm 0% 15 mph 70 % 1020 mb 0 mm/h
Tomorrow 1:00 am
weather icon
19° | 19°°C 0 mm 0% 13 mph 70 % 1011 mb 0 mm/h
Tomorrow 4:00 am
weather icon
17° | 18°°C 0.66 mm 66% 14 mph 77 % 1011 mb 0 mm/h
Tomorrow 7:00 am
weather icon
15° | 15°°C 0.2 mm 20% 13 mph 64 % 1013 mb 0 mm/h
Tomorrow 10:00 am
weather icon
18° | 18°°C 0 mm 0% 13 mph 45 % 1014 mb 0 mm/h
Tomorrow 1:00 pm
weather icon
20° | 20°°C 0 mm 0% 13 mph 32 % 1014 mb 0 mm/h
Tomorrow 4:00 pm
weather icon
23° | 23°°C 0 mm 0% 14 mph 30 % 1014 mb 0 mm/h
Tomorrow 7:00 pm
weather icon
21° | 21°°C 0 mm 0% 14 mph 40 % 1015 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
17° | 17°°C 0 mm 0% 11 mph 55 % 1016 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€86,264.95
-3.06%
Ethereum(ETH)
€1,900.39
-8.61%
Tether(USDT)
€0.87
0.01%
XRP(XRP)
€1.71
-5.23%
Solana(SOL)
€112.62
-5.86%
USDC(USDC)
€0.87
-0.01%
Dogecoin(DOGE)
€0.128913
-6.03%
Shiba Inu(SHIB)
€0.000009
-5.41%
Pepe(PEPE)
€0.000008
-9.41%
Peanut the Squirrel(PNUT)
€0.218233
13.10%
Scroll to Top