Bumblebee Loader Discovered With New Infection Chain
Bumblebee is a sophisticated downloader malware used by cybercriminals to access corporate networks and deploy payloads like Cobalt Strike and ransomware. First identified by Google in 2022 it resurfaced in 2024 following Europols Operation Endgame which targeted major malware botnets. Bumblebee infections typically start via phishing emails containing ZIP files with LNK files that execute a chain of events to load the malware into memory without writing to disk. The infection process uses MSI files and PowerShell commands to download and install the final payload stealthily avoiding detection by bypassing process creation. The malware uses RC4 encryption for configuration with hardcoded keys.