Teacher
Professional
- Messages
- 2,670
- Reaction score
- 775
- Points
- 113
The malware disappeared from radar 4 months ago, and now it has appeared before researchers in an even more sophisticated form.
The Bumblebee malware returned after a four-month hiatus and attacked thousands of organizations in the US with large-scale phishing campaigns.
Bumblebee is a bootloader discovered in April 2022. Presumably, it was developed by the criminal groups Conti and Trickbot as a replacement for the BazarLoader backdoor.
The software is usually distributed in phishing emails to install additional malware on infected devices. This can be a Cobalt Strike, which is used for initial penetration into the network,or ordinary ransomware.
In the new campaign, Bumblebee is hidden in fake voice message notifications. Users are sent emails allegedly from info@quarlessa[.] com with the subject " Voice message. February".
The message text contains a link to OneDrive, which loads a Word document with the name "ReleaseEvans#96.docm" or a similar name. This document contains macros for installing Bumblebee.
The use of macros in documents is unusual, given that Microsoft blocked them by default in 2022. Attackers may be trying to bypass the protection in this way.
Previously, methods such as direct DLL loading, embedding in HTML, and exploiting vulnerabilities were used to deliver Bumblebee. This is another difference between the current attack and more modern methods.
Bumblebee has experimented with documents containing macros in the past, but such cases accounted for only 4.3% of all registered campaigns.
Before the four-month break, in September 2023, the researchers noted a new method of spreading Bumblebee. Then the attackers began to use vulnerabilities in the WebDAV web service to bypass the lock and deliver the loader to the victims ' computers.
Although the new campaign cannot yet be attributed to any specific attackers, the handwriting is very similar to the activities of the TA579 group.
Experts warn that the return of Bumblebee could herald a surge in cybercrime in 2024. Along with it, other malware carriers, such as Pikabot, have also become active.
The Bumblebee malware returned after a four-month hiatus and attacked thousands of organizations in the US with large-scale phishing campaigns.
Bumblebee is a bootloader discovered in April 2022. Presumably, it was developed by the criminal groups Conti and Trickbot as a replacement for the BazarLoader backdoor.
The software is usually distributed in phishing emails to install additional malware on infected devices. This can be a Cobalt Strike, which is used for initial penetration into the network,or ordinary ransomware.
In the new campaign, Bumblebee is hidden in fake voice message notifications. Users are sent emails allegedly from info@quarlessa[.] com with the subject " Voice message. February".
The message text contains a link to OneDrive, which loads a Word document with the name "ReleaseEvans#96.docm" or a similar name. This document contains macros for installing Bumblebee.
The use of macros in documents is unusual, given that Microsoft blocked them by default in 2022. Attackers may be trying to bypass the protection in this way.
Previously, methods such as direct DLL loading, embedding in HTML, and exploiting vulnerabilities were used to deliver Bumblebee. This is another difference between the current attack and more modern methods.
Bumblebee has experimented with documents containing macros in the past, but such cases accounted for only 4.3% of all registered campaigns.
Before the four-month break, in September 2023, the researchers noted a new method of spreading Bumblebee. Then the attackers began to use vulnerabilities in the WebDAV web service to bypass the lock and deliver the loader to the victims ' computers.
Although the new campaign cannot yet be attributed to any specific attackers, the handwriting is very similar to the activities of the TA579 group.
Experts warn that the return of Bumblebee could herald a surge in cybercrime in 2024. Along with it, other malware carriers, such as Pikabot, have also become active.