Wednesday, March 22, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > Bumblebee malware returns with new capabilities

Bumblebee malware returns with new capabilities

Cyble announced that they have discovered a new version of Bumblebee in the wild with a new infection chain.


Erdem Yasar Erdem Yasar
September 9, 2022
3 min read
Bumblebee returns with new capabilities
  • Cyble announced that Bumblebee, a malware loader, has quickly become a key component in a wide range of cyberattacks.
  • Developers of Bumblebee loader keep updating the malware’s capabilities in order to strengthen its evasive maneuvers and anti-analysis tricks.
  • The initial infection starts with a spam email that has a password-protected attachment that contains a .VHD file.

Cyble Research & Intelligence Labs announced that they noticed a tweet wherein threat researcher @Max_Mal_ showed an infection chain of the Bumblebee loader malware being distributed. Bumblebee, a replacement for BazarLoader, acts as a downloader. It also delivers known attack frameworks and open-source tools. It is also capable of downloading other types of malware. Bumblebee was initially discovered in April.

#Bumblebee VHD Infection TTPs 🐝#DFIR Exec Flow:
VDH > LNK > PowerShell > csc > cvtres

[+] Obfuscated PS1 script
[+] PS1 script loads 64-bit DLL inside the PowerShell memory
[+] Bumblebee Export function: dataCheck ,setPath
[+] DLL internal name: LdrAddx64.dll 🔥 pic.twitter.com/mJvbCZiwqm

— Max_Malyutin (@Max_Mal_) August 30, 2022

New infection technique

The infection starts with a password-protected email attachment containing a .VHD extension file. It also contains two files, “Quote.lnk” and the second is a hidden file “imagedata.ps1”. The following target command line is used by the LNK for executing the PowerShell Script “imagedata.ps1”

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ep bypass -file imagedata.ps1

After the execution of the file, the PowerShell window is hidden and it runs the code in the background. The Powershell command for hiding the window is “-windowstyle hidden”. However, this malware uses “ShowWindows” to stay stealthy and avoid detection by antivirus scanners. Cyble also said in the report,

« PowerSploit is an open-source post-exploitation framework in which the malware uses a method, Invoke-ReflectivePEInjection, for reflectively loading the DLL into the PowerShell Process. This method validates the embedded file and performs multiple checks to ensure that the file is loaded properly on the executing system. »

To minimize the chance of being detected, Bumblebee also loads the flows from memory, instead of the host’s disk. This feature increases the malware’s stealthiness, especially during the deployments of its payloads, and makes it a bigger threat for many organizations. To avoid such attacks, Cyble recommends:

  • Refrain from opening untrusted links and email attachments without first verifying their authenticity.
  • Educate employees in terms of protecting themselves from threats like phishing’s/untrusted URLs.
  • Avoid downloading files from unknown websites.
  • Use strong passwords and enforce multi-factor authentication wherever possible.
  • Turn on the automatic software update feature on your computer, mobile, and other connected devices.
  • Use a reputed antivirus and internet security software package on your connected devices, including PC, laptop, and mobile.
  • Block URLs that could spread the malware, e.g., Torrent/Warez.
  • Monitor the beacon on the network level to block data exfiltration by malware or TAs.
  • Enable Data Loss Prevention (DLP) Solutions on the employees’ systems.

Cyble also said,

« Bumblebee, a recently developed malware loader, has quickly become a key component in a wide range of cyberattacks, besides replacing the existing BazarLoader. In an attempt to stay a step ahead of cybersecurity entities, Threat Actors (TAs) are constantly adapting new techniques and continuously monitoring to stay updated on the defense mechanisms employed by enterprises. Similarly, TAs behind the sophisticated Bumblebee loader keep updating its capabilities in order to strengthen its evasive maneuvers and anti-analysis tricks. CRIL has been closely monitoring the Bumblebee malware group and other similar TA groups for a better understanding of their motivations and keeping our readers well-informed on the latest cybercrime news and cybersecurity challenges. »

See more Cybersecurity News

A comprehensive guide to understanding Cybersecurity: What is Cybersecurity?


Tags: Cyble
Erdem Yasar

Erdem Yasar

Erdem Yasar is a news editor at Cloud7. Erdem started his career by writing video game reviews in 2007 for PC World magazine while he was studying computer engineering. In the following years, he focused on software development with various programming languages. After his graduation, he continued to work as an editor for several major tech-related websites and magazines. During the 2010s, Erdem Yasar shifted his focus to cloud computing, hosting, and data centers as they were becoming more popular topics in the tech industry. Erdem Yasar also worked with various industry-leading tech companies as a content creator by writing blog posts and other articles. Prior to his role at Cloud7, Erdem was the managing editor of T3 Magazine.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
The sixth maintenance update for LibreOffice 7.3 is ready

The sixth maintenance update for LibreOffice 7.3 is ready

Related News

7 best cybersecurity schools

7 best cyber security schools

March 21, 2023 9:00 pm
Akamai researchers warn about the new HinataBot botnet

Akamai researchers warn about the new HinataBot botnet

March 20, 2023 6:10 pm
7 biggest data breaches in the history of the internet

7 biggest data breaches in the history of the internet

March 16, 2023 10:55 pm
The number of ransomware attacks increased by 82% in 2022

The number of ransomware attacks increased by 82% in 2022

March 14, 2023 6:45 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Recent News

  • 7 best cyber security schools
  • 7 oldest Linux distros that are still being maintained
  • OVHcloud purchases its first Quandela quantum computer
  • Leil Storage launches an innovative data storage solution
  • Tails 5.11 is released, download it now

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • Artificial Intelligence
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About Us
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.