A new version of the Bumblebee malware loader has been spotted in the wild, featuring a new infection chain that uses the PowerSploit framework for stealthy reflective injection of a DLL payload into memory. […]
Home>Secure Hunter Blog>Anti-Malware News>Bumblebee malware adds post-exploitation tool for stealthy infections