Skip to content

Cyber Security And Bitcoin Blockchain News

The World

  • Ethereum Hashrate Taps an All-Time High Amid This Week’s Crypto Market Meltdown – Mining Bitcoin News bitcoin news
  • El Salvador’s Bitcoin Volcano Bonds Launch Still on Hold, According to Treasury Minister – Bitcoin News bitcoin news
  • ETH Back Below $2,000 to Start the Weekend – Market Updates Bitcoin News bitcoin news
  • SOL, NEAR Fall Over 10% During Tuesday’s Session – Market Updates Bitcoin News bitcoin news
  • Cytrox’s Predator Spyware Target Android Users with Zero-Day Exploits cyber security news
  • Bitcoin Breaks $30K, Why This Could Turn Into Larger Downtrend bitcoin news
  • NASA Partners With Epic Games to Create a Martian Metaverse Simulation – Metaverse Bitcoin News bitcoin news
  • Bitcoin Whale Breaks 8 Year Long Silence With $30 Million Worth Of BTC Transfer bitcoin news

Cybercriminals Using New Malware Loader ‘Bumblebee’ in the Wild

Posted on May 2, 2022 By root No Comments on Cybercriminals Using New Malware Loader ‘Bumblebee’ in the Wild


Cybercriminal actors previously observed delivering BazaLoader and IcedID as part of their malware campaigns are said to have transitioned to a new loader called Bumblebee that’s under active development.

“Based on the timing of its appearance in the threat landscape and use by multiple cybercriminal groups, it is likely Bumblebee is, if not a direct replacement for BazaLoader, then a new, multifunctional tool used by actors that historically favored other malware,” enterprise security firm Proofpoint said in a report shared with The Hacker News.

Campaigns distributing the new highly sophisticated loader are said to have commenced in March 2022, while sharing overlaps with malicious activity leading to the deployment of Conti and Diavol ransomware, raising the possibility that the loader could act as a precursor for ransomware attacks.

“Threat actors using Bumblebee are associated with malware payloads that have been linked to follow-on ransomware campaigns,” the researchers said.

Besides featuring anti-virtualization checks, Bumblebee is written in C++ and is engineered to act as a downloader for retrieving and executing next-stage payloads, including Cobalt Strike, Sliver, Meterpreter, and shellcode.

Interestingly, the increased detection of the malware loader in the threat landscape corresponds to a drop in BazaLoader deployments since February 2022, another popular loader used for delivering file-encrypting malware and developed by the now-defunct TrickBot gang, which has since been absorbed into Conti.

Attack chains distributing Bumblebee have taken the form of DocuSign-branded email phishing lures incorporating fraudulent links or HTML attachments, leading potential victims to a compressed ISO file hosted on Microsoft OneDrive.

What’s more, the embedded URL in the HTML attachment makes use of a traffic direction system (TDS) dubbed Prometheus — which is available for sale on underground platforms for $250 a month — to redirect the URLs to the archive files based on the time zone and cookies of the victims.

The ZIP files, in turn, include .LNK and .DAT files, with the Windows shortcut file executing the latter containing the Bumblebee downloader, before using it to deliver BazaLoader and IcedID malware.

A second campaign in April 2022 involved a thread-hijacking scheme in which legitimate invoice-themed emails were taken over to send zipped ISO files, which were then used to execute a DLL file to activate the loader.

CyberSecurity

Also observed is the abuse of the contact form present on the target’s website to send a message claiming copyright violations of images, pointing the victim to a Google Cloud Storage link that results in the download of a compressed ISO file, thereby continuing the aforementioned infection sequence.

The transition from BazaLoader to Bumblebee is further evidence that these threat actors — likely initial access brokers who infiltrate targets and then sell that access to others — are receiving the malware from a common source, while also signaling a departure after the Conti group’s attack toolkit became public knowledge around the same time.

The development also coincides with Conti taking over the infamous TrickBot botnet and shutting it down to focus on the development of BazaLoader and Anchor malware. It’s not immediately clear if Bumblebee is the work of TrickBot actors and whether the leaks prompted the gang to abandon BazaLoader in favor of an entirely new malware.

But Cybereason malware researcher Eli Salem, in an independent analysis, identified points of similarities between Bumblebee and TrickBot, including the use of the latter’s web-inject module and the same evasion technique, lending credence to the possibility that the authors behind Bumblebee may have had access to TrickBot’s source code.

“The introduction of the Bumblebee loader to the crimeware threat landscape and its apparent replacement for BazaLoader demonstrates the flexibility threat actors have to quickly shift TTPs and adopt new malware,” Sherrod DeGrippo, vice president of threat research and detection at Proofpoint, said.

“Additionally, the malware is quite sophisticated, and demonstrates being in ongoing, active development introducing new methods of evading detection,” DeGrippo added.





TheHackersNews/

cyber security news

Post navigation

Previous Post: Analysts Predict ApeCoin To Hit $50 By End Of 2025
Next Post: Cloudflare Thwarts Record DDoS Attack Peaking at 15 Million Requests Per Second

Related Posts

  • Critical TLStorm 2.0 Bugs Affect Widely-Used Aruba and Avaya Network Switches cyber security news
  • U.S. Warns Against North Korean Hackers Posing as IT Freelancers cyber security news
  • Another Set of Joker Trojan-Laced Android Apps Resurfaces on Google Play Store cyber security news
  • Google to Add Passwordless Authentication Support to Android and Chrome cyber security news
  • Researchers Warn of Nerbian RAT Targeting Entities in Italy, Spain, and the U.K cyber security news
  • Google’s New Safety Section Shows What Data Android Apps Collect About Users cyber security news

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Archives

  • May 2022

Categories

  • bitcoin news
  • cyber security news

Recent Posts

  • Russian Court Recognizes Cryptocurrency as Means of Payment, Prosecutors See Precedent – Regulation Bitcoin News
  • Bitcoin, Ethereum Exchange Inflows Suggest Sell-Offs Are Far From Over
  • SOL, NEAR Fall Over 10% During Tuesday’s Session – Market Updates Bitcoin News
  • Popular PyPI Package ‘ctx’ and PHP Library ‘phpass’ Hijacked to Steal AWS Keys
  • ETH Back Under $2,000 as Balenciaga Gains Lose Steam – Market Updates Bitcoin News

Recent Comments

No comments to show.
  • Yes, Containers Are Terrific, But Watch the Security Risks cyber security news
  • Crypto Market More Oversold Than Black Thursday bitcoin news
  • Tether CTO Says, USDT-Dollar Remains Strong Amid Stablecoin Crises bitcoin news
  • New Data Shows China Still Controls 21% Of The Global Bitcoin Mining Hashrate bitcoin news
  • Malicious NPM Packages Target German Companies in Supply Chain Attack cyber security news
  • Following French Montana, Vietnam’s Number 1 Celebrity Singer Son Tung M-TP Joins RACA’s USM Metaverse – Press release Bitcoin News bitcoin news
  • Stablecoin Shuffle — Terra Fiasco Shakes up Fiat-Pegged Crypto Economy, Over $35 Billion Disappears – Bitcoin News bitcoin news
  • Germany Declares Crypto Gains Tax-Free After 1 Year — Even if Used for Staking, Lending – Taxes Bitcoin News bitcoin news

Copyright © 2022 Cyber Security And Bitcoin Blockchain News.

Powered by PressBook News Dark theme