Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer



Recent reports have highlighted several software supply chain attacks that have compromised critical systems worldwide. In this article, we explore a particularly alarming incident involving RVTools, a popular VMware environment reporting utility, which was hacked to deliver the Bumblebee malware via a trojanized installer.

  • RVTools' official website has been compromised with a malicious installer containing Bumblebee malware.
  • The malicious DLL was discovered by security researcher Aidan Leon and is associated with numerous high-profile attacks in the past.
  • Users are urged to verify the installer's hash and review any execution of version.dll from user directories to prevent malware spread.
  • A recent supply chain attack also affected Procolored printers, which included a Delphi-based backdoor called XRed and clipper malware dubbed SnipVex.


  • In a recent development that highlights the ever-evolving threat landscape of software supply chain attacks, the official website of RVTools has been compromised and is now serving a malicious installer that contains the Bumblebee malware. The news comes as a warning to users who may have inadvertently downloaded and installed the tainted version of the popular VMware environment reporting utility.

    According to reports, security researcher Aidan Leon first discovered the infected installer on one of his websites. Further investigation revealed that the malicious DLL included in the installer was none other than a known malware loader called Bumblebee, which has been associated with numerous high-profile attacks in the past. It is unclear how long the trojanized version of RVTools had been available for download or how many users may have installed it before the site was taken offline.

    In light of this incident, cybersecurity experts are urging users to take immediate action to protect themselves from potential harm. The best course of action would be for users to verify the installer's hash and review any execution of version.dll from user directories. This simple step can help prevent the malware from spreading further and reduce the risk of infection.

    However, this incident is not an isolated case, as recent reports have highlighted several other software supply chain attacks that have compromised critical systems worldwide. For instance, in a separate development, researchers revealed that Procolored printers were found to include a Delphi-based backdoor called XRed and a clipper malware dubbed SnipVex that's capable of substituting wallet addresses in the clipboard with that of a hard-coded address.

    The discovery of these malicious activities was first made by Cameron Coward, who is behind the YouTube channel Serial Hobbyism. XRed, believed to be active since at least 2019, comes with features to collect system information, log keystrokes, propagate via connected USB drives, and execute commands sent from an attacker-controlled server to capture screenshots, enumerate file systems and directories, download files, and delete files from the system.

    [SnipVex], on the other hand, searches the clipboard for content that resembles a BTC address and replaces it with the attacker's address, such that cryptocurrency transactions will be diverted to the attacker. The malware infects .EXE files with the clipper functionality and makes use of an infection marker sequence – 0x0A 0x0B 0x0C – at the end to avoid re-infecting the files a second time.

    Procolored has since acknowledged that the software packages were uploaded to the Mega file hosting service in October 2024 via USB drives and that the malware may have been introduced during this process. Software downloads are currently only available for F13 Pro, VF13 Pro, and V11 Pro products.

    The incident highlights the ever-present threat of supply chain attacks, which can have far-reaching consequences for individual users and organizations alike. It also underscores the importance of verifying the authenticity of software installations and being cautious when downloading and installing new applications from unknown sources.

    In light of this incident, cybersecurity experts are urging users to exercise extreme caution when dealing with potentially malicious software. The best course of action would be for users to remain vigilant and monitor their systems closely for any signs of infection.

    Furthermore, the incident serves as a stark reminder that even reputable companies can fall victim to supply chain attacks. This is evident in the case of Procolored printers, which were found to include malicious software despite being marketed as secure devices.

    In conclusion, the recent compromise of RVTools' official website highlights the ever-present threat of software supply chain attacks. It is essential for users to be vigilant and take immediate action to protect themselves from potential harm. By verifying the authenticity of software installations and being cautious when downloading and installing new applications, users can significantly reduce their risk of falling victim to such attacks.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/RVTools-Official-Site-Hacked-to-Deliver-Bumblebee-Malware-via-Trojanized-Installer-ehn.shtml

  • https://thehackernews.com/2025/05/rvtools-official-site-hacked-to-deliver.html

  • https://www.bleepingcomputer.com/news/security/bumblebee-malware-returns-after-recent-law-enforcement-disruption/

  • https://www.avertium.com/resources/threat-reports/everything-you-need-to-know-about-bumblebee-malware

  • https://cybersecuritynews.com/malicious-drivers-infected-with-xred-malware/

  • https://www.bleepingcomputer.com/news/security/printer-maker-procolored-offered-malware-laced-drivers-for-months/


  • Published: Mon May 19 12:39:30 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us