Busy Bees- The Transformation of Malicious Loader BumbleBee

Logo
Presented by

Patrick Staubmann, Threat Researcher, VMRay; Brandon Dunlap, Moderator

About this talk

Since its inception, the malware loader known as BumbleBee has been involved in numerous cyberattacks, delivering harmful payloads from known malware families. It has consistently showcased its ability to evolve and resist detection - a clear signal that its development is far from over. This makes BumbleBee an interesting and important object of research. To protect itself against manual as well as automated analysis, BumbleBee uses various techniques to detect isolated analysis environments. Most of this logic is taken from an open-source sandbox detection project. Join VMRay and (ISC)2 on 27 July 2023 at 1 p.m. BST to hear insights into BumbleBee's modus operandi, focusing on its unique sandbox detection techniques. We’ll provide an in-depth analysis, discuss its trajectory, and outline a path forward for security teams.
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (411)
Subscribers (101130)
ISC2 Security Briefings EMEA offers members in Europe, the Middle East and Africa a chance to learn about the latest trends, tools and best practices in cyber, information, software and infrastructure security while earning CPEs