• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Breaking Computer security data security Device security Intruders Latest Cybersecurity News Windows security

New Bumblebee malware has complete stealth and can deploy ransomware

William Marshal Posted On September 9, 2022
0



Bumblebee malware

Bumblebee malware is back again this time with a new version that is featuring a infection chain that uses the PowerSploit framework for stealthy reflective injection of a DLL payload into memory.

What is Bumblebee malware?

Bumblebee malware involves phishing campaign that is orchestrated by Bazarloader and TrickBot operators, aka Conti Sydnicate. The malware was first discovered in April. The Bumblebee malware is an evolved loader with exceptional anti-detection and anti-analysis capabilities, it was expected to replace BazarLaodedr to deploy ransomware after the initial compromise.

As per a report by Cyble, the authors of Bumblebee malware are in plans for summer hiatus of spam operation with an updated workflow.

Modus Operandi of Bumblebee Malware

It begins with a phished e-mail that contained a password-protected zipped ISO files with an LNK and a DLL file. The recent attack had Bumblebee replaced its ISO with a VHD and the LNK file.

LNK executes ‘imagedata.ps1’ instead of the DLL using a PowerShell windows and keeps it invisible to the user by exploiting the ‘ShowWindow’ command.

The SP1 script is obfuscated using Base64 and string concatenation to evade antivirus detection while loading the next stage of the PowerShell loader.

Bumblebee malware

The next stage has the same obfuscation initially and then the PowerSploit module to execute the 64-Bit malware into the memory of PowerShell process usign the reflective injection.

“PowerSploit is an open-source post-exploitation framework in which the malware uses a method, Invoke-ReflectivePEInjection, for reflectively loading the DLL into the PowerShell Process.

This method validates the embedded file and performs multiple checks to ensure that the file is loaded properly on the executing system.” as per the Cyble report.

This malware can also load the flow from the memory and never touches the disk, which is why it escapes detection by endpoint security software. With better stealth, Bumblebee malware becomes more dangerous and has the potential of deploying ransomware and other malicious activities on the infected devices.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter. You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.

Share the article with your friends


Cybersecuritydata securitymalwarePhishingRansomware


Author

William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

You may also like
Recast Software: Advanced Endpoint Management and Security Tools for IT Teams
November 16, 2024
Patch My PC: Streamlined Software Management for ConfigMgr and Intune
November 9, 2024
Best Microsoft Intune Alternatives: Top 5 MDMs to Consider
November 4, 2024
Leave A Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Recast Software: Advanced Endpoint Management and Security...
      November 16, 2024
    • Patch My PC: Streamlined Software Management for ConfigMgr...
      November 9, 2024
    • Best Microsoft Intune Alternatives: Top 5 MDMs to Consider
      November 4, 2024
    • Top 11 Log Management Tools for Efficient System Management
      September 20, 2024
    • Top 5 Threat Intelligence Tools For 2024
      September 19, 2024


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search