Alerts
Events
DCR
Explore Cyware Products
Alerts
Events
DCR
Go to listing page
Bumblebee Malware Adds Post-Exploitation Tool for Stealthy Infections
Malware and Vulnerabilities
September 09, 2022
Bleeping Computer
A new version of the Bumblebee malware loader has been spotted in the wild, featuring a new infection chain that uses the PowerSploit framework for stealthy reflective injection of a DLL payload into memory.
Read More
Bumblebee
Malware Loader
PowerSploit
Reflective Dll Injection
post-exploitation tool
Publisher
Previous
70% of Indian firms hit by a ransomware attack in last ...
Trends, Reports, Analysis
Next
Shopify Fails to Prevent Known Breached Passwords
Trends, Reports, Analysis