Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer

Posted on May 19, 2025May 19, 2025 By CWS

Could 19, 2025Ravie LakshmananMalware / Provide Chain Assault
The official web site for RVTools has been hacked to serve a compromised installer for the favored VMware atmosphere reporting utility.
“Robware.internet and RVTools.com are presently offline. We’re working expeditiously to revive service and admire your endurance,” the corporate mentioned in an announcement posted on its web site.
“Robware.internet and RVTools.com are the one approved and supported web sites for RVTools software program. Don’t seek for or obtain purported RVTools software program from every other web sites or sources.”

The event comes after safety researcher Aidan Leon revealed that an contaminated model of the installer downloaded from the web site was getting used to sideload a malicious DLL that turned out to be a recognized malware loader referred to as Bumblebee.
It is presently not recognized how lengthy the trojanized model of RVTools had been out there for obtain and what number of had put in it earlier than the location was taken offline.
Within the interim, customers are really helpful to confirm the installer’s hash and overview any execution of model.dll from consumer directories.
The disclosure comes because it has come to mild that the official software program provided with Procolored printers included a Delphi-based backdoor referred to as XRed and a clipper malware dubbed SnipVex that is able to substituting pockets addresses within the clipboard with that of a hard-coded tackle.
Particulars of the malicious exercise have been first found by Cameron Coward, who’s behind the YouTube channel Serial Hobbyism.
XRed, believed to be energetic since no less than 2019, comes with options to gather system info, log keystrokes, propagate by way of linked USB drives, and execute instructions despatched from an attacker-controlled server to seize screenshots, enumerate file methods and directories, obtain information, and delete information from the system.
“[SnipVex] searches the clipboard for content material that resembles a BTC tackle and replaces it with the attacker’s tackle, such that cryptocurrency transactions will probably be diverted to the attacker,” G DATA researcher Karsten Hahn, who additional investigated the incident, mentioned.

However in an attention-grabbing twist, the malware infects .EXE information with the clipper performance and makes use of an an infection marker sequence – 0x0A 0x0B 0x0C – on the finish to keep away from re-infecting the information a second time. The pockets tackle in query has acquired 9.30857859 BTC (about $974,000) thus far.
Procolored has since acknowledged that the software program packages have been uploaded to the Mega file internet hosting service in October 2024 by way of USB drives and that the malware could have been launched throughout this course of. Software program downloads are presently solely out there for F13 Professional, VF13 Professional, and V11 Professional merchandise.
“The malware’s command-and-control server has been offline since February 2024,” Hahn famous. “So it’s not attainable that XRed established a profitable distant connection after that date. The accompanying clipbanker virus SnipVex continues to be a severe risk. Though transactions to the BTC tackle stopped on March 3, 2024, the file an infection itself damages methods.”

Discovered this text attention-grabbing? Observe us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Bumblebee, Deliver, Hacked, Installer, Malware, Official, RVTools, Site, Trojanized

Post navigation

Previous Post: Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Access
Next Post: Printer Company Procolored Served Infected Software for Months

Related Posts

New Chrome Vulnerability Enables Cross-Origin Data Leak via Loader Referrer Policy The Hacker News
NSO Group Fined $168M for Targeting 1,400 WhatsApp Users With Pegasus Spyware The Hacker News
5 BCDR Essentials for Effective Ransomware Defense The Hacker News
Critical Langflow Flaw Added to CISA KEV List Amid Ongoing Exploitation Evidence The Hacker News
Beyond Vulnerability Management – Can You CVE What I CVE? The Hacker News
Researchers Uncover Malware in Fake Discord PyPI Package Downloaded 11,500+ Times The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Recover From a Data Breach
  • BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software
  • Printer Company Procolored Served Infected Software for Months
  • RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer
  • Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2025

Recent Posts

  • How to Recover From a Data Breach
  • BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software
  • Printer Company Procolored Served Infected Software for Months
  • RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer
  • Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News