The Bumblebee and Latrodectus malware families have re-emerged, employing sophisticated phishing strategies following their setbacks from Operation Endgame, a Europol initiative conducted in May 2024. Bumblebee malware has been observed in an infection chain for the first time since this law enforcement action. Cybercriminals are using Bumblebee to deliver Cobalt Strike beacons and ransomware. Additionally, the Gophish framework is being utilized in phishing campaigns to deploy remote access trojans, while fake WordPress plug-ins are infecting sites with infostealers. These developments highlight the evolving tactics of cybercriminals in the cybersecurity landscape.
Bumblebee Malware Is Buzzing Back to Life: https://t.co/Gh6wP9m6yQ by darkreading #infosec #cybersecurity #technology #news
Bumblebee Malware Loader Resurfaces Following Law Enforcement Takedown #cybersecurity https://t.co/QjTQj3rhyg
Ransomware Gangs Use LockBit's Fame to Intimidate Victims in Latest Attacks: https://t.co/Mq6pWTwxxd by The Hacker News #infosec #cybersecurity #technology #news