Malware, Ransomware, Phishing
Bumblebee malware loader reemerges in new attacks

Sliver malware spread by SimpleHelp RMM exploits. (Adobe Stock)
Attacks deploying the Bumblebee malware loader — linked to Trickbot developers and leveraged to deploy information-stealing and ransomware payloads — have been discovered more than four months after the disruption of the botnet, alongside the IcedID, Trickbot, Pikabot, SystemBC, and SmokeLoader malware loaders as part of the international law enforcement effort Operation Endgame, BleepingComputer reports. Threat actors behind the latest intrusions delivered phishing emails with a malicious ZIP archive, which when executed prompts the download of a malicious NVIDIA driver update or Midjourney installer-spoofing .MSI file, according to a Netskope analysis. Stealthy execution of the file would be followed by the exploitation of the MSI structure's SelfReg table to load a DLL, which would eventually result in Bumblebee malware loader delivery in memory. Further analysis of the reemergent Bumblebee loader showed "NEW_BLACK" string utilization of the configuration decrypting RC4 key, as well as the presence of the new "msi" and "lnk001" campaign IDs but no details about the payloads injected by Bumblebee were provided.
An In-Depth Guide to Ransomware
Get essential knowledge and practical strategies to protect your organization from ransomware attacks.
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
Related Terms
AdwareYou can skip this ad in 5 seconds