• About
  • Disclaimer
  • Privacy Policy
  • Contact
Thursday, July 17, 2025
Cyber Defense GO
  • Login
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
Cyber Defense Go
No Result
View All Result
Home Cyber Security

RVTools Official Web site Hacked to Ship Bumblebee Malware through Trojanized Installer

Md Sazzad Hossain by Md Sazzad Hossain
0
RVTools Official Web site Hacked to Ship Bumblebee Malware through Trojanized Installer
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter


Could 19, 2025Ravie LakshmananMalware / Provide Chain Assault

Bumblebee Malware

The official web site for RVTools has been hacked to serve a compromised installer for the favored VMware setting reporting utility.

“Robware.internet and RVTools.com are presently offline. We’re working expeditiously to revive service and admire your persistence,” the corporate stated in a press release posted on its web site.

“Robware.internet and RVTools.com are the one licensed and supported web sites for RVTools software program. Don’t seek for or obtain purported RVTools software program from every other web sites or sources.”

Cybersecurity

The event comes after safety researcher Aidan Leon revealed that an contaminated model of the installer downloaded from the web site was getting used to sideload a malicious DLL that turned out to be a identified malware loader known as Bumblebee.

It is presently not identified how lengthy the trojanized model of RVTools had been obtainable for obtain and what number of had put in it earlier than the location was taken offline.

Within the interim, customers are advisable to confirm the installer’s hash and overview any execution of model.dll from consumer directories.

The disclosure comes because it has come to mild that the official software program provided with Procolored printers included a Delphi-based backdoor known as XRed and a clipper malware dubbed SnipVex that is able to substituting pockets addresses within the clipboard with that of a hard-coded deal with.

Particulars of the malicious exercise had been first found by Cameron Coward, who’s behind the YouTube channel Serial Hobbyism.

XRed, believed to be energetic since a minimum of 2019, comes with options to gather system data, log keystrokes, propagate through linked USB drives, and execute instructions despatched from an attacker-controlled server to seize screenshots, enumerate file methods and directories, obtain information, and delete information from the system.

“[SnipVex] searches the clipboard for content material that resembles a BTC deal with and replaces it with the attacker’s deal with, such that cryptocurrency transactions will likely be diverted to the attacker,” G DATA researcher Karsten Hahn, who additional investigated the incident, stated.

Cybersecurity

However in an fascinating twist, the malware infects .EXE information with the clipper performance and makes use of an an infection marker sequence – 0x0A 0x0B 0x0C – on the finish to keep away from re-infecting the information a second time. The pockets deal with in query has obtained 9.30857859 BTC (about $974,000) to this point.

Procolored has since acknowledged that the software program packages had been uploaded to the Mega file internet hosting service in October 2024 through USB drives and that the malware might have been launched throughout this course of. Software program downloads are presently solely obtainable for F13 Professional, VF13 Professional, and V11 Professional merchandise.

“The malware’s command-and-control server has been offline since February 2024,” Hahn famous. “So it isn’t potential that XRed established a profitable distant connection after that date. The accompanying clipbanker virus SnipVex remains to be a critical menace. Though transactions to the BTC deal with stopped on March 3, 2024, the file an infection itself damages methods.”

Discovered this text fascinating? Comply with us on Twitter  and LinkedIn to learn extra unique content material we put up.



You might also like

Why Your Wi-Fi Works however Your Web Doesn’t (and How you can Repair It)

How Fidelis Integrates Detection and Response for SQL-Based mostly Exploits

How India’s DPDP Act Impacts Digital Lending

Tags: BumblebeedeliverhackedInstallerMalwareOfficialRVToolsSiteTrojanized
Previous Post

What Netflix, Amazon, and Spotify Train Us About Knowledge Monetization

Next Post

LightLab: ljusmanipulering i bilder med diffusionsbaserad teknik

Md Sazzad Hossain

Md Sazzad Hossain

Related Posts

The Carruth Knowledge Breach: What Oregon Faculty Staff Must Know
Cyber Security

Why Your Wi-Fi Works however Your Web Doesn’t (and How you can Repair It)

by Md Sazzad Hossain
July 17, 2025
How Fidelis Integrates Detection and Response for SQL-Based mostly Exploits
Cyber Security

How Fidelis Integrates Detection and Response for SQL-Based mostly Exploits

by Md Sazzad Hossain
July 16, 2025
How India’s DPDP Act Impacts Digital Lending
Cyber Security

How India’s DPDP Act Impacts Digital Lending

by Md Sazzad Hossain
July 16, 2025
MITRE Launches New Framework to Sort out Crypto Dangers
Cyber Security

MITRE Launches New Framework to Sort out Crypto Dangers

by Md Sazzad Hossain
July 15, 2025
Anomaly detection betrayed us, so we gave it a brand new job – Sophos Information
Cyber Security

Anomaly detection betrayed us, so we gave it a brand new job – Sophos Information

by Md Sazzad Hossain
July 15, 2025
Next Post
Kinesiska MiniMax lanserar öppna källkodsmodeller

LightLab: ljusmanipulering i bilder med diffusionsbaserad teknik

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

600+ AI Micro SaaS Concepts for Entrepreneurs in 30+ Classes • AI Parabellum

600+ AI Micro SaaS Concepts for Entrepreneurs in 30+ Classes • AI Parabellum

April 1, 2025
Fixing Nokia SR-OS Configuration Templates « ipSpace.web weblog

Fixing Nokia SR-OS Configuration Templates « ipSpace.web weblog

June 16, 2025

Categories

  • Artificial Intelligence
  • Computer Networking
  • Cyber Security
  • Data Analysis
  • Disaster Restoration
  • Machine Learning

CyberDefenseGo

Welcome to CyberDefenseGo. We are a passionate team of technology enthusiasts, cybersecurity experts, and AI innovators dedicated to delivering high-quality, insightful content that helps individuals and organizations stay ahead of the ever-evolving digital landscape.

Recent

The Carruth Knowledge Breach: What Oregon Faculty Staff Must Know

Why Your Wi-Fi Works however Your Web Doesn’t (and How you can Repair It)

July 17, 2025
How an Unknown Chinese language Startup Stole the Limelight from the Stargate Venture – IT Connection

Google Cloud Focuses on Agentic AI Throughout UK Summit – IT Connection

July 17, 2025

Search

No Result
View All Result

© 2025 CyberDefenseGo - All Rights Reserved

No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration

© 2025 CyberDefenseGo - All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In