Current Cyber Threats

Trojanized RVTools/KeePass Push Malware in SEO Poisoning Campaigns

Summary:
In a recent supply chain attack, threat actors distributed a trojanized version of RVTools containing the Bumblebee malware loader. This malicious version was promoted through SEO poisoning and typosquatted domains, leading users to download the compromised installer.

Bumblebee is a sophisticated malware loader, it doesn’t cause direct damage on its own, but it is designed to download, execute, and manage other malicious payloads on infected systems. It’s often used as the initial access vector in advanced cyberattacks, especially by ransomware operators and financially motivated threat actors.

Security researcher Aidan Leon discovered that the malicious installer attempted to execute a version.dll file identified as the Bumblebee malware loader. He noted a mismatch between the file hash listed on the RVTools website and the actual file being downloaded, indicating a compromise.

Dell, the current maintainer of RVTools, stated:

"We have identified fake websites designed to mimic our websites that may be distributing malware. Our legitimate websites - Robware.net and RVTools.com - have been the subject of recent denial of service (DOS) attacks. As a precaution, we temporarily disabled these sites."

Despite Dell's assertion that their official sites were not compromised, researchers observed discrepancies suggesting otherwise.

Official Distribution:
The legitimate sources for downloading RVTools are rvtools[.]com and robware[.]net. Dell has confirmed that these are the only authorized and supported websites for RVTools software. However, both sites are currently offline due to ongoing denial-of-service (DoS) attacks.

Threat actors employed typosquatting techniques to deceive users into downloading malicious software. Specifically, they registered a domain that closely resembled the legitimate RVTools website, altering only the top-level domain (TLD) from .com to .org.

KeePass (Similar Campaign)
A similar campaign is currently targeting KeePass, the open-source password manager. Threat actors have been distributing trojanized versions of KeePass, dubbed "KeeLoader," which appear legitimate but are modified to include malicious functionalities.

Official KeePass Domain
Legitimate Website: https://keepass[.]info

Known Typosquatted Domains
Attackers have registered domains that closely resemble the official KeePass website to deceive users into downloading malicious installers. These typosquatted domains include:
  • keeppaswrd[.]com
  • keegass[.]com
  • keepass[.]me
  • KeePass-info[.]aenys[.]com
Analyst Comments:
The RVTools vulnerability is a critical security concern because it illustrates the vulnerability of trusted IT tools that are widely used across industries and environments. RVTools, now maintained by Dell Technologies, is a core utility in virtualized infrastructure management, typically found in enterprise, government, healthcare, finance, and service provider environments.

Threat actors breaching this tool can gain initial access to valuable networks where VMware infrastructure is critical. Since RVTools is known and regularly run with high privileges, a compromised version can bypass normal user suspicion and security controls, leading to the deployment of malware like Bumblebee, a precursor to ransomware or data exfiltration activity.

This attack highlights the increasing danger of supply chain attacks, in which attackers don't attack the victim directly but instead poison software sources that organizations utilize.

Any business that utilizes virtualization, and that's nearly every medium to large enterprise, would be at risk if the integrity of their software sources isn't rigorously checked.

Security teams must consider even small, third-party admin tools as potential entry points and implement controls to establish software integrity and monitor endpoint behavior after installation.

Suggested Corrections:
As part of your response to the RVTools/KeePass supply chain attack, companies should review network and DNS logs for any connections to typosquatted domains known to be associated with the Bumblebee malware campaign.
  • rvtools[.]org
  • keeppaswrd[.]com
  • keegass[.]com
  • keepass[.]me
  • KeePass-info[.]aenys[.]com
Additionally,
  • Verify Installer Integrity: If RVTools was recently downloaded, compute its hash and compare it against known legitimate versions. Use tools like VirusTotal to scan the installer for malicious content.
  • Conduct Endpoint Assessments: Inspect systems where RVTools was installed for signs of Bumblebee malware or its components, such as suspicious version.dll files. Utilize endpoint detection and response (EDR) solutions to identify anomalous behaviors.
  • Enhance User Awareness: Educate users about the risks of downloading software from unofficial sources. Emphasize the importance of verifying website URLs and being cautious of search engine results that may lead to malicious sites.
  • Monitor Network Activity: Set up alerts for unusual outbound connections that may indicate malware communication. Review logs for any anomalies associated with recent software installations.
Link(s):
https://www.bleepingcomputer.com/ne...-bumblebee-malware-in-seo-poisoning-campaign/