Hackers Using Bumblebee Loader to Compromise Active Directory Services

22 August 2022

The malware loader known as Bumblebee is being increasingly co-opted by threat actors associated with BazarLoader, TrickBot, and IcedID in their campaigns to breach target networks for post-exploitation activities.

"Bumblebee operators conduct intensive reconnaissance activities and redirect the output of executed commands to files for exfiltration," researchers said in a technical write-up.

Bumblebee first came to light in March 2022 when Google's Threat Analysis Group (TAG) unmasked the activities of an initial access broker dubbed Exotic Lily with ties to the TrickBot and the larger Conti collectives.

Typically delivered via initial access acquired through spear-phishing campaigns, the modus operandi has since been tweaked by eschewing macro-laced documents in favor of ISO and LNK files, primarily in response to Microsoft's decision to block macros by default.

"Distribution of the malware is done by phishing emails with an attachment or a link to a malicious archive containing Bumblebee," the researchers said. "The initial execution relies on the end-user execution which has to extract the archive, mount an ISO image file, and click a Windows shortcut (LNK) file."

The LNK file, for its part, contains the command to launch the Bumblebee loader, which is then used as a conduit for next-stage actions such as persistence, privilege escalation, reconnaissance, and credential theft.

Also employed during the attack is the Cobalt Strike adversary simulation framework upon gaining elevated privileges on infected endpoints, enabling the threat actor to laterally move across the network. Persistence is achieved by deploying AnyDesk remote desktop software.

In the incident analyzed by researcher, the stolen credentials of a highly privileged user were subsequently utilized to seize control of the Active Directory, not to mention create a local user account for data exfiltration.

"The time it took between initial access and Active Directory compromise was less than two days," the cybersecurity firm said. "Attacks involving Bumblebee must be treated as critical, [...] and this loader is known for ransomware delivery.

Related News

Why Zero Trust Should be the Foundation of Your Cybersecurity Ecosystem

26 Sep 2022

For cybersecurity professionals, it is a huge challenge to separate the "good guys" from the "villains". In the past, most cyberattacks could simply be traced to external cybercriminals, cyberterrorists, or rogue nation-states. But not anymore.

Read More

Microsoft: Iranian hackers encrypt Windows systems using BitLocker

19 Sep 2022

Microsoft says an Iranian state-sponsored threat group it tracks as DEV-0270 (aka Nemesis Kitten) has been abusing the BitLocker Windows feature in attacks to encrypt victims' systems.

Read More

CLOUD APPLICATIONS ARE THE MAJOR CATALYST FOR CYBER-ATTACKS: MICROSOFT

12 Sep 2022

At any point in time on any day of the week, Microsoft’s cloud computing operations are under cyber-attack: The company detects a whopping 1.5 million attempts a day to compromise its systems.

Read More