
The Bumblebee malware search engine optimization poisoning marketing campaign uncovered earlier this week aimpersonating RVTools is utilizing extra typosquatting domainsi mimicking different well-liked open-source initiatives to contaminate units utilized by IT workers.
BleepingComputer was capable of finding two instances leveraging the notoriety of Zenmap, the GUI for the Nmap community scanning software, and the WinMTR tracerout utility.
Each of those instruments are generally utilized by IT workers to diagnose or analyze community site visitors, requiring administrative privileges for among the options to work This makes customers of those instruments prime targets for risk actors seeking to breach company networks and unfold laterally to different units.
The Bumblebee malware loader has been pushed by at the very least two domains – zenmap[.]professional and winmtr[.]org. Whereas the latter is at present offline, the previous continues to be on-line and exhibits a faux weblog web page about Zenmap when visited immediately.
When customers are redirected to zenmap[.]professional from from search outcomes, although, it exhibits a clone of the authentic web site for the nmap (Community Mapper) utility:

Supply: BleepingComputer
The 2 websites obtained site visitors by search engine optimization poisoning and rank excessive in Google and Bing search outcomes for the related phrases.
.jpg)
Supply: BleepingComputer
Bleepingcolputer’s checks present that if you happen to go to the faux Zenmap website immediately, it exhibits a number of AI-generated articles as a substitute, as seen within the picture beneath:

Supply: BleepingComputer
The payloads delivered by the obtain part ‘zenmap-7.97.msi’ and ‘WinMTR.msi, and so they each evade detection from most antivirus engines on VirusTotal [1, 2].
The installers ship the promised software together with a malicious DLL, as within the case of RVTools, which drops a Bumblebee loader on customers’ units.
From there, the backdoor can be utilized to profile the sufferer and introduce extra payloads, which can embrace infostealers, ransomware, and different forms of malware.
Aside from the open-source instruments talked about above, BleepingComputer has additionally seen the identical marketing campaign focusing on customers searching for Hanwha safety digital camera administration software program WisenetViewer.
Cyjax’s researcher Joe Wrieden additionally noticed a trojanized model of the video administration software program Milestone XProtect being a part of the identical marketing campaign, the malicious installers being delivered ‘milestonesys[.]org’ (on-line).
Official RVTools nonetheless offline
Each official RVTools domains – Robware.web and RVTools.com – are at present exhibiting a warning for customers to not obtain the software program from unofficial websites however do not make obtainable the obtain hyperlink themselves.
Following allegations that the official RVTools website pushed a malware-laced installer, Dell Applied sciences denied the accusation saying that its websites didn’t distribute a trojanized variant of the product.
Dell acknowledged that the official RVTools websites have been taken offline as a result of they have been being the targets of distributed denial-of-service (DDoS) assaults.
One rationalization for the assaults can be that the risk actor behind Bumblebee determined to take down the official obtain portals to drive to the malicious websites customers trying to find different sources for the software.
To mitigate the chance of putting in trojanized variations of authentic software program, the very best suggestion is to ensure to get it from official sources and package deal managers.
It is usually value checking the downloaded installer’s hash with a identified, clear model earlier than operating it.
