Rule Category

MALWARE-BACKDOOR -- Snort has detected suspicious communication traffic unrelated to commands, such as exfiltration of data from the infected machine, especially larger chunks of data.

Alert Message

MALWARE-BACKDOOR Win.Trojan.BumbleBee webshell transfer attempt

Rule Explanation

This rule will look for patterns used in the malicious BumbleBee webshell when any access attempt to is detected in the local network. This webshell allows an attacker to control a remote windows server with the execution of commands and the upload and download of files.

What To Look For

This rule will alert when there's an attempt to access a malicious webshell called BumbleBee

Known Usage

No public information

False Positives

No known false positives

Contributors

Cisco Talos Intelligence Group

MITRE ATT&CK Framework

Tactic: Lateral Movement

Technique: Exploitation of Remote Services

For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org

Additional Links

Rule Vulnerability

Information Leak

Information Leakage happens when an attacker manipulates a system into revealing sensitive information, either through malformed input or by taking advantage of another feature of the system.

CVE Additional Information