MALWARE-BACKDOOR -- Snort has detected suspicious communication traffic unrelated to commands, such as exfiltration of data from the infected machine, especially larger chunks of data.
MALWARE-BACKDOOR Win.Trojan.BumbleBee webshell access detected
This rule will look for patterns used in the malicious BumbleBee webshell when any access attempt to is detected in the local network. This webshell allows an attacker to control a remote windows server with the execution of commands and the upload and download of files.
What To Look For
This rule will alert when there's an attempt to access a malicious webshell called BumbleBee
No public information
No known false positives
Cisco Talos Intelligence Group
MITRE ATT&CK Framework
Tactic: Lateral Movement
Technique: Exploitation of Remote Services
For reference, see the MITRE ATT&CK vulnerability types here:
Information Leakage happens when an attacker manipulates a system into revealing sensitive information, either through malformed input or by taking advantage of another feature of the system.
CVE Additional Information