Bumblebee Malware Adds Post-Exploitation Tool for Stealthy Infections
A new version of the Bumblebee malware loader has been spotted in the wild, featuring a new infection chain that uses the PowerSploit framework for stealthy reflective injection of a DLL payload into memory.