It has been reported that a new variant of the Bumblebee malware is being used to target organizations for malicious activities. The malware is being spread through phishing email campaign in the global landscape.
Infection Mechanism
This phishing campaign targets multiple organizations and uses fake voicemail notifications to spread the Bumblebee malware.

The email contains a URL that leads to a Word document having name like "ReleaseEvans#96.docm" or in other such formats for targeting the organization.

Upon opening the document, it launches VBA macros that trigger a PowerShell command, which downloads and runs another PowerShell script from a remote server. That script subsequently retrieves and executes the Bumblebee loader.
As observed this malware is commonly distributed through phishing campaigns that deliver additional payloads, such as Cobalt Strike beacons, for network access and ransomware attacks.
Indicator of Compromise:
Example URL in email:
- hxxps[:]//1drv[.]ms/w/s!At-ya4h-odvFe-M3JKvLzB19GQA?e=djPGy
- hxxps[:]//1drv[.]ms/w/s!AuSuRB5deTxugQ-83_HzIqbBWuE1?e=9f2plW
SHA256 of example Word document downloaded from OneDrive:
- 0cef17ba672793d8e32216240706cf46e3a2894d0e558906a1782405a8f4decf
- 86a7da7c7ed5b915080ad5eaa0fdb810f7e91aa3e86034cbab13c59d3c581c0e
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|