Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Are you forgotten accounts of advertising services that leave you risk?

June 17, 2025

New Flodrix Botnet Option Operates Langflow Ai Server RCE BUG to launch DDOS ATTACKS

June 17, 2025

Lack of the TP-Link Cve-2023-33538 router under active operation, CISA releases an immediate warning

June 17, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Bumblebee and Latrodectus malware are back with sophisticated phishing strategies
Global Security

Bumblebee and Latrodectus malware are back with sophisticated phishing strategies

AdminBy AdminOctober 22, 2024No Comments3 Mins Read
Bumblebee and Latrodectus Malware
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


October 22, 2024Ravi LakshmananMalware / Threat Intelligence

Bumblebee and Latrodectus malware

Two malware families hit after coordinated law enforcement operation called Endgame have reappeared as part of new phishing campaigns.

Bumblebee and A thiefwhich are both malware downloaders designed to steal personal data and download and execute additional payloads on compromised hosts.

Tracked as BlackWidow, IceNova, Lotus or Unidentified 111, Latrodectus, also considered successor to IcedID due to overlapping infrastructure between the two malware families. It was used in companies associated with two Initial Access Brokers (IABs) known as TA577 (aka Water Curupira) and TA578.

A coalition of European countries announced this in May 2024 disassembled over 100 servers associated with multiple malware strains such as IcedID (and by extension Latrodectus), SystemBC, PikaBot, SmokeLoader, Bumblebee and TrickBot.

Cyber ​​security

“Although Latrodectus was not mentioned in the operation, it was also affected and its infrastructure was disabled,” Bitsight security researcher Joao Batista noted back in June 2024.

Cybersecurity firm Trustwave, in an analysis published earlier this month, described Latrodectus as a “distinct threat” that got a boost after Operation Endgame.

“Although Latrodectus was initially impacted, it quickly recovered. Its advanced capabilities have filled the void left by its limited counterparts, proving itself to be a formidable threat,” the cybersecurity company reports. said.

Attack chains are typically used by spam campaigns using captured email streams and impersonating legitimate entities such as Microsoft Azure and Google Cloud to activate the malware deployment process.

The recently observed sequence of infection by Power point and Logpoint follows the same route: DocuSign-themed emails with PDF attachments containing a malicious link or HTML files with embedded JavaScript code created to download an MSI installer and a PowerShell script, respectively.

Regardless of the method used, the attack ends up deploying a malicious DLL file, which in turn launches the Latrodectus malware.

“Latrodectus leverages legacy infrastructure combined with an innovative new method of distributing malware payloads across the financial, automotive and business sectors,” said Forcepoint researcher Mayur Sewani.

The current Latrodectus campaigns are coupled with the return of the Bumblebee downloader, which uses a ZIP archive as its delivery mechanism, likely downloaded via phishing emails.

Cyber ​​security

“The ZIP file contains an LNK file called ‘Report-41952.lnk’ which, when executed, triggers a chain of events to download and execute the final Bumblebee payload in memory, avoiding the need to write the DLL to disk,” Netskope researcher. Leandro Froes said.

The LNK file is for running a PowerShell command to download the MSI installer from a remote server. Once launched, the MSI samples masquerading as installers from NVIDIA and Midjourney serve as conduits to launch the Bumblebee DLL.

“Bumblebee uses a more stealthy approach to avoid spawning other processes and avoids writing the final payload to disk,” Froes noted.

“It is done with help Samareg table to force the DllRegisterServer export function present in the File a table An entry in the SelfReg table acts as a key to indicate which file to execute in the File table, and in our case it was the final DLL of the payload.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Are you forgotten accounts of advertising services that leave you risk?

June 17, 2025

New Flodrix Botnet Option Operates Langflow Ai Server RCE BUG to launch DDOS ATTACKS

June 17, 2025

Lack of the TP-Link Cve-2023-33538 router under active operation, CISA releases an immediate warning

June 17, 2025

Meta begins showing advertisements on WhatsApp after 6 years delay with the 2018 announcement

June 17, 2025

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Are you forgotten accounts of advertising services that leave you risk?

June 17, 2025

New Flodrix Botnet Option Operates Langflow Ai Server RCE BUG to launch DDOS ATTACKS

June 17, 2025

Lack of the TP-Link Cve-2023-33538 router under active operation, CISA releases an immediate warning

June 17, 2025

Meta begins showing advertisements on WhatsApp after 6 years delay with the 2018 announcement

June 17, 2025

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Are you forgotten accounts of advertising services that leave you risk?

June 17, 2025

New Flodrix Botnet Option Operates Langflow Ai Server RCE BUG to launch DDOS ATTACKS

June 17, 2025

Lack of the TP-Link Cve-2023-33538 router under active operation, CISA releases an immediate warning

June 17, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.