19.4 C
Canberra
Wednesday, March 4, 2026

RVTools Official Website Hacked to Ship Bumblebee Malware by way of Trojanized Installer


Might 19, 2025Ravie LakshmananMalware / Provide Chain Assault

RVTools Official Website Hacked to Ship Bumblebee Malware by way of Trojanized Installer

The official web site for RVTools has been hacked to serve a compromised installer for the favored VMware surroundings reporting utility.

“Robware.internet and RVTools.com are at present offline. We’re working expeditiously to revive service and respect your endurance,” the corporate stated in a press release posted on its web site.

“Robware.internet and RVTools.com are the one approved and supported web sites for RVTools software program. Don’t seek for or obtain purported RVTools software program from every other web sites or sources.”

Cybersecurity

The event comes after safety researcher Aidan Leon revealed that an contaminated model of the installer downloaded from the web site was getting used to sideload a malicious DLL that turned out to be a identified malware loader referred to as Bumblebee.

It is at present not identified how lengthy the trojanized model of RVTools had been obtainable for obtain and what number of had put in it earlier than the location was taken offline.

Within the interim, customers are advisable to confirm the installer’s hash and overview any execution of model.dll from person directories.

The disclosure comes because it has come to gentle that the official software program equipped with Procolored printers included a Delphi-based backdoor referred to as XRed and a clipper malware dubbed SnipVex that is able to substituting pockets addresses within the clipboard with that of a hard-coded deal with.

Particulars of the malicious exercise have been first found by Cameron Coward, who’s behind the YouTube channel Serial Hobbyism.

XRed, believed to be energetic since a minimum of 2019, comes with options to gather system info, log keystrokes, propagate by way of related USB drives, and execute instructions despatched from an attacker-controlled server to seize screenshots, enumerate file methods and directories, obtain information, and delete information from the system.

“[SnipVex] searches the clipboard for content material that resembles a BTC deal with and replaces it with the attacker’s deal with, such that cryptocurrency transactions will probably be diverted to the attacker,” G DATA researcher Karsten Hahn, who additional investigated the incident, stated.

Cybersecurity

However in an attention-grabbing twist, the malware infects .EXE information with the clipper performance and makes use of an an infection marker sequence – 0x0A 0x0B 0x0C – on the finish to keep away from re-infecting the information a second time. The pockets deal with in query has acquired 9.30857859 BTC (about $974,000) to this point.

Procolored has since acknowledged that the software program packages have been uploaded to the Mega file internet hosting service in October 2024 by way of USB drives and that the malware could have been launched throughout this course of. Software program downloads are at present solely obtainable for F13 Professional, VF13 Professional, and V11 Professional merchandise.

“The malware’s command-and-control server has been offline since February 2024,” Hahn famous. “So it isn’t potential that XRed established a profitable distant connection after that date. The accompanying clipbanker virus SnipVex remains to be a critical risk. Though transactions to the BTC deal with stopped on March 3, 2024, the file an infection itself damages methods.”

Discovered this text attention-grabbing? Observe us on Twitter and LinkedIn to learn extra unique content material we submit.



Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

[td_block_social_counter facebook="tagdiv" twitter="tagdivofficial" youtube="tagdiv" style="style8 td-social-boxed td-social-font-icons" tdc_css="eyJhbGwiOnsibWFyZ2luLWJvdHRvbSI6IjM4IiwiZGlzcGxheSI6IiJ9LCJwb3J0cmFpdCI6eyJtYXJnaW4tYm90dG9tIjoiMzAiLCJkaXNwbGF5IjoiIn0sInBvcnRyYWl0X21heF93aWR0aCI6MTAxOCwicG9ydHJhaXRfbWluX3dpZHRoIjo3Njh9" custom_title="Stay Connected" block_template_id="td_block_template_8" f_header_font_family="712" f_header_font_transform="uppercase" f_header_font_weight="500" f_header_font_size="17" border_color="#dd3333"]
- Advertisement -spot_img

Latest Articles