TechBriefly
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska
No Result
View All Result
TechBriefly
Home Tech Security
BumbleBee malware exploits Google Ads to target corporate users

BumbleBee malware exploits Google Ads to target corporate users

Utku BayrakbyUtku Bayrak
26 April 2023
in Security
Reading Time: 3 mins read
Share on FacebookShare on Twitter

The ever-evolving world of cybersecurity has given rise to a new threat called BumbleBee malware. It is a dangerous tool used by ransomware gangs to infiltrate networks and launch attacks. Initially discovered in April 2022, the malware is believed to have been created by the Conti team to replace the BazarLoader backdoor.

A recent version of BumbleBee malware was found in the wild, with a more stealthy attack chain that uses the PowerSploit framework for reflective DLL injection into memory.

This enables the malware to load into memory undetected by existing antivirus software, making it harder to detect and prevent.

BumbleBee malware
A more current variant of the BumbleBee virus has been discovered in the wild, with a more stealthy attack chain that employs the PowerSploit framework for reflection DLL injection into memory

BumbleBee malware distributed via SEO poisoning

Secureworks researchers uncovered a new campaign that promotes trojanized versions of popular apps and delivers the BumbleBee malware to unsuspecting victims via Google ads. The ads promote software like Zoom, Cisco AnyConnect, ChatGPT, and Citrix Workspace, redirecting users to fake download pages that prompt them to download a trojanized version of the software.

A fake Cisco AnyConnect Secure Mobility Client download page was created and hosted on the “appcisco.com” domain on February 16, 2023, according to SecureWorks. Users were directed to this page via a compromised WordPress site by a malicious Google ad. The bogus landing page advertised a trojanized MSI installer called “cisco-anyconnect-4 9 0195.msi,” which installs the BumbleBee malware.

BumbleBee malware
The advertisements offer products such as Zoom, Cisco AnyConnect, ChatGPT, and Citrix Workspace, referring consumers to bogus download pages that ask them to install a trojanized version of the program

When the user runs the installer, a copy of the legitimate program installer and a PowerShell script with a deceptive name (cisco2.ps1) are copied to their computer. The legitimate AnyConnect installer installs the application on the device to avoid suspicion, while the PowerShell script installs the BumbleBee malware and conducts malicious activity on the compromised device.

The BumbleBee virus is aimed at corporate users

Corporate users are the primary targets of this trojanized software, making infected devices prime targets for the beginning of ransomware attacks. Secureworks discovered other software packages with similarly named file pairs, such as ZoomInstaller.exe and Zoom.ps1, ChatGPT.msi, and chch.ps1, and CitrixWorkspaceApp.exe and Citrix.ps1.

Secureworks investigated a recent BumbleBee attack and found that the threat actor used their access to the compromised system to move laterally in the network three hours after the initial infection.

The attackers employed a range of tools, including the Cobalt Strike pen-testing suite, the AnyDesk and DameWare remote access tools, network scanning utilities, an AD database dumper, and a Kerberos credentials stealer.

This arsenal creates an attack profile that suggests the malware operators are interested in identifying vulnerable network points, pivoting to other machines, exfiltrating data, and eventually deploying ransomware. Corporate users should take precautions to protect their networks from these types of attacks.

BumbleBee malware
Other software packages with similarly named file pairings uncovered by SecureWorks include ZoomInstaller.exe and Zoom.ps1, ChatGPT.msi, and chch.ps1, and CitrixWorkspaceApp.exe and Citrix.ps1

Previous cases of hackers utilizing Google Ads

Cybercriminals have used Google Ads for years to spread malware and launch phishing attacks. Google removed over 2.7 billion bad ads in 2020 and blocked 1.2 million advertiser accounts for breaking its policies. Ads for malware distribution, phishing, and scams were among them.

In one notable case from 2019, cybercriminals used Google Ads to promote fake Ledger Live Chrome extensions that stole users’ cryptocurrency holdings. Similarly, in 2017, cybercriminals used Google Ads to promote a malware-infected version of the popular WhatsApp messaging app.

These examples demonstrate that cybercriminals not only use sophisticated methods, but also legitimate advertising channels to distribute malware and conduct phishing attacks. As more people work remotely and rely on software applications to collaborate, individuals and organizations must remain vigilant and aware of the risks associated with downloading and installing software from untrusted sources.

If you are interested in security, we suggest that you check out Twitter phishing attacks: Verification fee’s unexpected side effects, or Battle net down Battle net DDoS attack explained (11 Oct).

ShareTweet
Utku Bayrak

Utku Bayrak

Related Posts

Anna’s Archive leaks 300TB of Spotify’s music catalog

Anna’s Archive leaks 300TB of Spotify’s music catalog

22 December 2025
EU regulators accuse TikTok of ongoing data transfers to China

EU regulators accuse TikTok of ongoing data transfers to China

22 December 2025
Cisco announces hackers exploiting AsyncOS zero-day

Cisco announces hackers exploiting AsyncOS zero-day

19 December 2025
Koi uncovers data harvesting in Urban VPN Proxy

Koi uncovers data harvesting in Urban VPN Proxy

19 December 2025

LATEST

New WhatsApp update brings 2026 stickers and video call effects

Leaker reveals Xiaomi plans for high end eSIM device in 2026

HP prepares OMEN OLED monitor reveal for CES 2026

High RAM costs from AI boom could delay next Xbox and PlayStation

LG to unveil its Gallery TV at CES 2026

Bitcoin drops 3% to $87,300 as altcoins decline

How to install mods and custom content in The Sims 2

Running Python files and fixing path errors on Windows

How to boot your PC into Command Prompt for troubleshooting

How to delete a virus using Command Prompt

TechBriefly

© 2021 TechBriefly is a Linkmedya brand.

  • Tech
  • Business
  • Science
  • Geek
  • How to
  • About
  • Privacy
  • Terms
  • Contact
  • | Network Sites |
  • Digital Report
  • LeaderGamer

Follow Us

No Result
View All Result
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska