Hackers Using Bumblebee Loader to Compromise Active Directory Services August 18, 2022 Cybereason: THREAT ANALYSIS REPORT: Bumblebee Loader – The High Road to Enterprise Domain Control
Bumblebee malware adds post-exploitation tool for stealthy infections By Bill Toulas @billtoulas - September 8, 2022 Cyble: Bumblebee Returns With New Infection Technique
Quoted from the posted link: This is where the end user potential target victim needs a little bit of self education: why open this kind of attachment in the first place?? Some nice security utilities to aid in blocking this attachment in case of a click-happy target: OSArmor: Block execution of .ps1 (PowerShell) scripts Hard_Configurator: Block Sponsors->PowerShell.exe & LNK designated file types except in whitelisted locations. Note that antivirus is not necessarily required to prevent this exploit from executing in the first place.