The malware loader known as Bumblebee is being increasingly co-opted by threat actors

Discussion in 'malware problems & news' started by guest, Aug 18, 2022.

  1. guest

    guest Guest

    Hackers Using Bumblebee Loader to Compromise Active Directory Services
    August 18, 2022
    Cybereason: THREAT ANALYSIS REPORT: Bumblebee Loader – The High Road to Enterprise Domain Control
     
  2. guest

    guest Guest

    Bumblebee malware adds post-exploitation tool for stealthy infections
    By Bill Toulas @billtoulas - September 8, 2022
    Cyble: Bumblebee Returns With New Infection Technique
     
  3. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,549
    Location:
    U.S.A. (South)
    Slippery sneaky computer system harasser's- We'll see about that :mad:

     
  4. wat0114

    wat0114 Registered Member

    Joined:
    Aug 5, 2012
    Posts:
    4,104
    Location:
    Canada
    Quoted from the posted link:

    This is where the end user potential target victim needs a little bit of self education: why open this kind of attachment in the first place??

    Some nice security utilities to aid in blocking this attachment in case of a click-happy target:
    1. OSArmor: Block execution of .ps1 (PowerShell) scripts
    2. Hard_Configurator: Block Sponsors->PowerShell.exe & LNK designated file types except in whitelisted locations.
    Note that antivirus is not necessarily required to prevent this exploit from executing in the first place.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.