Cybercriminals Exploit Bing Search Results to Distribute Bumblebee Malware

In July 2025, cybersecurity researchers uncovered a sophisticated campaign where threat actors manipulated Bing search results to distribute the Bumblebee malware, leading to severe ransomware attacks. This operation specifically targeted users searching for ManageEngine OpManager, a legitimate IT management software, highlighting the evolving tactics of cybercriminals in exploiting trusted search platforms to infiltrate enterprise networks.

The Attack Mechanism

The attack commenced when users searched for ManageEngine OpManager on Microsoft’s Bing search engine. Instead of being directed to the official software vendor’s website, they were led to a malicious domain, opmanager[.]pro. This counterfeit site hosted a trojanized MSI installer named ManageEngine-OpManager.msi, which closely resembled the authentic software package but was embedded with malicious components designed to establish initial access to victim networks.

Upon executing the malicious installer, the software appeared to function normally, installing the legitimate ManageEngine OpManager application to avoid raising suspicion. However, during the installation process, the malware simultaneously deployed a malicious dynamic link library (DLL) file named msimg32.dll through the Windows consent.exe process. This sophisticated technique allowed the malware to bypass security controls while maintaining the appearance of a legitimate software installation.

Bumblebee Malware Deployment

The Bumblebee malware established command and control communications with remote servers using domain generation algorithm (DGA) domains. Approximately five hours after the initial execution, the malware deployed an AdaptixC2 beacon identified as AdgNsy.exe, creating an additional communication channel and providing threat actors with persistent access to the compromised environment.

Privilege Escalation and Lateral Movement

The success of this attack was largely due to its focus on IT management tools, ensuring that users executing the malware possessed highly privileged administrator accounts within Active Directory environments. This strategic approach granted threat actors immediate elevated access, eliminating the need for complex privilege escalation techniques typically required in targeted attacks.

Following initial reconnaissance using built-in Windows utilities, the attackers created two new domain accounts named backup_DA and backup_EA. The backup_EA account was strategically added to the Enterprise Administrators group, granting the attackers domain-wide administrative privileges.

The threat actors then connected to domain controllers via Remote Desktop Protocol and extracted the NTDS.dit file using the Windows Backup Admin tool. This technique allowed them to obtain password hashes for all domain accounts, facilitating further exploitation.

Culmination in Ransomware Deployment

The campaign culminated in the deployment of Akira ransomware using the payload locker.exe. The attackers achieved encryption in just a few hours, leading to significant operational disruptions and data loss for the affected organizations.

Implications and Recommendations

This campaign underscores the evolving tactics of cybercriminals who are now leveraging search engine optimization (SEO) poisoning to distribute malware. By manipulating search engine results, they can effectively target users seeking legitimate software, increasing the likelihood of successful infections.

To mitigate such threats, organizations and individuals should adopt the following measures:

1. Verify Download Sources: Always download software from official vendor websites. Be cautious of search engine results and verify URLs before downloading any software.

2. Implement Security Controls: Utilize endpoint protection solutions that can detect and block malicious activities. Regularly update these solutions to ensure they can identify the latest threats.

3. Educate Users: Conduct regular training sessions to educate users about the risks of downloading software from unverified sources and the importance of cybersecurity hygiene.

4. Monitor Network Activity: Implement network monitoring tools to detect unusual activities that may indicate a compromise.

5. Restrict Administrative Privileges: Limit administrative privileges to essential personnel and implement the principle of least privilege to reduce the potential impact of a compromised account.

By adopting these practices, organizations can enhance their defenses against sophisticated malware campaigns that exploit trusted platforms to distribute malicious software.