Tag: Bumblebee
-
US orgs subjected to reemerging Bumblebee malware attacks
Thousands of organizations across the U.S. have been targeted by a new phishing campaign deploying the Bumblebee malware, which was last …
-
Bumblebee Malware Returns with New Tricks, Targeting U.S. Businesses
The infamous malware loader and initial access broker known as Bumblebee has resurfaced after a four-month absence as part of a new …
-
Bumblebee malware wakes from hibernation, forgets what year it is, attacks with macros
The Bumblebee malware loader seemingly vanished from the internet last October, but it’s back and – oddly – relying on a vintage vector to …
-
Notorious Bumblebee Malware Re-emerges with New Attack Methods
Bumblebee malware has re-emerged following a four-month absence from the cyber threat landscape, according to Proofpoint research. The new …
-
Bumblebee Malware Abuses WebDAV Protocol to Attack Organizations
In recent cybersecurity news, the notorious Bumblebee loader has made a resurgence in a new campaign, posing a significant threat to …
-
New Bumblebee malware campaign exploits 4shared WebDAV services
Operators of the Bumblebee malware loader have launched a new campaign involving the exploitation of 4shared Web Distributed Authoring and …
-
Hackers Use PindOS Javascript Dropper to Deploy Bumblebee, IcedID Malware
Threat actors use a new strain of JavaScript dropper that deploys malware like Bumblebee and IcedID and has a low detection rate. Security …
-
New JavaScript-based Dropper Delivers Bumblebee and IcedID Malware
The latest research unveiled the JavaScript-based droppers, which deliver Bumblebee and IcedID malware instead of PowerShell-based …
-
Deep Instinct uncovers new JavaScript-based malware dropper
Threat protection startup Deep Instinct Ltd.’s Threat Research Lab today provided details of a new strain of JavaScript-based dropper …
-
New strain of JavaScript dropper delivers Bumblebee and IcedID malware
A new strain of a JavaScript dropper was observed recently delivering Bumblebee and IcedID malware, a development security pros should take …
-
Trojanized Installers Used to Distribute Bumblebee Malware
Popular software tools such as Zoom, Cisco AnyConnect, ChatGPT and Citrix Workspace have been trojanized to distribute the malware known as …
-
New Research Delves into the World of Malicious LNK Files and Hackers Behind Them
Cybercriminals are increasingly leveraging malicious LNK files as an initial access method to download and execute payloads such as …
●●●