Buzzing in Your Computer

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

Tom: Hey, did either of you check out the script?
Aaron: Yeah Tom, now shut up the movie is about to start.
Photo by Pavel Danilyuk, please support by following @pexel.com

So, you’re a fan of Transformers, huh? Well, brace yourself, because this might shock you. You know how those robots can turn into cars, planes, and other stuff?

Well, guess what? Some of them can also hack into your computer or your online accounts without breaking a sweat. It’s crazy, the internet never stops being the place where people can exploit sweet childhood memories.

We’re going to look at what the attack is, who is using it, the functionality and effects upon release, and what are some ways to protect yourself from this transformer transforming your life into a nightmare.

Kim: So uh…we’re just friends huh?
Dave: *Thinking: If I pretend like I’m drinking she’ll stop asking me questions.*
Photo by Pavel Danilyuk, please support by following @pexel.com

The Attack

Have you ever experienced a transforming nightmare?  For those who may not know it’s called “malware” which means “malicious software”.  This refers to any software that is designed to harm, disrupt, or steal data from a computer or a network. You can think of this as your neighbor offering you food knowing it’s laced with naptime medicine.

The newest addition to being laced with something that stings and honey is not included is called “BumbleBee”. BumbleBee is a malware downloader written in C++ language and has a single function that handles various tasks.

This is malware that can hide in plain sight and deliver ransomware payloads to infected systems. In a nutshell, this bee sting giveth and this bee taketh your data.

Not only do I collect pollen but I can give your computer everything you never wanted, like a virus.
Photo by Egor Kamelev, please support by following @pexel.com

Who Can It Be Now

Who would set something like this up to take your data? Well, we’re happy to tell you that this didn’t come out from Beyonce’s beehive. BumbleBee has been linked to several cybercriminal groups, such as EXOTIC LILY and TrickBot.

Let us quickly go over the two. EXOTIC LILY is a financially motivated group that may have acted as initial access brokers for other malicious actors and targets a wide range of industries also involving IT.

TrickBot is a Trojan that threat actors spread via spear phishing campaigns. This is done by using tailored emails that contain malicious links. And you thought ChatGPT was only good for fixing resumes and completing essays.

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

Well, it’s time to mail some ransomware.
Photo by Liza Summer, please support by following @pexel.com

That Sinking Feeling

Now moving on to how something like BumbleBee works. BumbleBee is a downloader that is distributed through malspam (malware spam- spam email with malware) campaigns. Emails are sent with a malicious attachment that has an ISO extension.

When the user opens the attachment, they see a folder with two files: a DLL file and an LNK file. Both files are infected with this troublesome transformer. The LNK file is a shortcut that executes the DLL file when clicked. Trigging the BumbleBee downloader to download and run other malware on the compromised system.

What’s the other malware that could be downloaded we hear you ask. Well, this could be but is not limited to viruses, worms, trojans, spyware, adware, ransomware, and more. What problems can they cause? Don’t worry, we have you on that as well.

Malware can cause various problems, such as slowing down the system, encrypting or deleting files, displaying unwanted ads, or demanding a ransom to restore access. Malware can infect a device through various methods, such as downloading attachments, clicking on links, visiting malicious websites, or using infected USB drives.

So all in all, BumbleBee gets into your system, transforms, drops off, and rolls out. And you thought Optimus was bad.

This isn’t what we meant as far as protecting your information but it’s a start.
Photo by cottonbro studio, please support by following @pexel.com

The Prevention

So how does one protect themselves from what came from the beehive? Well, to protect your computer from malware and other threats of the like. You should follow some basic security practices.

First, avoid opening attachments and clicking on links in emails that look off or are irrelevant to you. Especially if they came from an unknown sender. Second, use only official tools to update and activate the software you use. And never download or run any cracks, keygens, or patches from unknown sources.

Third, keep your operating system and applications updated with the latest security patches and fixes. Fourth, download software and files only from official or reputable websites, and avoid using third-party downloaders.

Lastly, install a reliable antivirus program on your computer and scan your system regularly for any potential infections or vulnerabilities. Many issues will come a buzzing but if you can avoid being stung from a hit and run, then do so.

It’s a good thing I read Scriptingthewhy. I knew these bees were acting funny. IT’S TIME TO GET YA’ll IN ORDER!
Photo by Anete Lusina, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, sharing this with whomever, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you feel like there is something I may have missed on BumbleBee? Script a comment below.

Owls Up There with Fed Banking

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

To be or not to be…poor. That is the question. WAIT, WHY IS THAT EVEN A QUESTION!?
Photo by Andrea Piacquadio, please support by following @pexel.com

Let’s start this off by asking a simple question and this is something that many of you can relate to. How many of you enjoy having a bank account full of money? It’s safe to assume that almost everyone reading this script enjoys having a decent sum of money in their bank account.

I know that there may have been a very, very, very small few that might have said, “Money isn’t real, the real value of you isn’t in the form of numbers.” To them, I ask, if that is true then why is it that every time I get a bill, I spiral into a panic attack? Explain that one, however, you’re not wrong, that’s not the point being made here, so hush.

Suppose like in many situations, you check your account before going to sleep to confirm you have a decent amount, but when waking up you get an alert sounding like the accountant bit from South Park talking about your bank account, “Annnd, it’s gone. Your money, it’s all gone.” Let me script for you how this may have happened.

Dear sweet Satan’s cornhole…Z-Daddy was right. My accounts are at zero.
Photo by Andrea Piacquadio, please support by following @pexel.com

Halloween Gone Mobile

So, the numbers in your bank account are gone with the wind and you’re probably wondering how you got to this junction. Well, let me inform you that you may have been infected with a virus called SOVA.

SOVA is a virus designed for mobile phones, as you can predict this is mainly for Android phones, but iPhone users don’t think you’re safe. Your sweet saucy phone jack is just not on the menu for now.

SOVA, in case you were wondering means owl in Russian, the name was given because owls are nocturnal birds of prey, they’re silent, and like a slow jam from the 80s, they stalk and capture their prey. As you could have already guessed, this is Michael Myers of the animal kingdom, and it very well could be on your mobile device.

I don’t stalk my prey; they just don’t see me coming. Stop making a big woot…oh I saw what you did there.
Photo by Pixabay, please support by following @pexel.com

Night-time Owls, Day-time Collection

Outside of SOVA being given a cute name by the threat actor, the first version made its first appearance on the underground markets back in September of 2021. For those who don’t know what the underground markets are, they’re the “dark web” or may also be called the “dark net”. And before you ask, no, there is not an underground store in either of those areas.

SOVA was shown that it not only had the ability to collect usernames, passwords, and other information, but it also has an interesting function that will be brought up later. Trust me, you’re not going to like this. If you suffer from having trust issues with people, you’re really going to have it with your phone after reading this script.

No, no, no, annnnnnd now it’s gone. All of my money, it’s all gone.
Photo by Karolina Grabowska, please support by following @pexel.com

Intruder at Hand

Right now, you’re probably looking at your phone and thinking “I don’t trust you.” And you would be right since your phone is the main attack vector for this malware/virus/trojan. That’s right, viruses have pronouns too.

SOVA is distributed by a smishing attack, which is another form of phishing where the attacker is trying to bait you into clicking on a link for further malicious intent via text messaging.

Once the fake application is installed on the phone, it then sends the list of all applications installed on your device back to the command-and-control server (C2C), this is done with the intent for the attacker to then choose which app to target.

The attacker fires back the malware that can perform collecting keystrokes, steal cookies, intercept multi-factor authentication tokens, copy and paste, and add fake overlays for a range of apps.

But are you ready to have some major trust issues? This malware can perform actions like clicking, swiping, and pretty much interacting the same way as if you were using it. This is all done via the accessibility service, guessing this is the last time you’ll trust a handicap sign.

All of our accounts are wiped clean, if only we kept reading Scriptingthewhy.
Photo by energepic.com, please support by following @pexel.com

Panic, Pause, and Simple Steps

While this seems like the sky is falling and you’re never going to dance again because empty words have no rhythm. Though it’s easy to pretend, knowing this information will not make you a fool. Always be very careful when you download from a friend as this could be potential harm that you have been given.

A few other ways of preventing from downloading such malware are to make sure you check all of the details of the application such as reviews and how often the application is downloaded. Make sure you download from only trusted sources like the manufacturer’s store or from the app store.

Other practices are making sure your OS (Operating System), applications, and anti-virus software are up to date. Most of the ways to keep your devices and information safe are to follow simple best practices but most of the time the combination of “It’s our app and we want it now” and reading takes too much effort that exposes us to possible threats.

This is my third time this month getting a spa treatment, and it’s all thanks to those cursed scripts. Bless you Z-Daddy.
Photo by John Tekeridis, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you feel like I may have missed something about SOVA? Script a comment below.

Icebergs and the Darknet

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

couple laying down on boat deck.
Sarah: Tom, did you read the latest script on Scriptingthewhy?
Tom: No, I don’t find any of them funny.
Sarah: Oh really…it’s over.
Photo by KoolShooters, please support by following @pexel.com

You are on the bow of the titanic with your version of Jack and you’re feeling like you’re the queen, king, it, them, they, infinite letters and symbols of the world. For those who have seen the titanic, you know the ending, despite there being enough room on the floating door Jack chooses the “Irish exit” over dealing with possible child support cases.

Since the movie The Titanic’s release which seems like it has been forever, this isn’t much of a spoiler; people get on a boat, party hard, the captain sucks at captaining, and the boat finds that icebergs have a deeper meaning to them.

The symbolism in all of this, what is it? Well, after figuring out what gender you land your spinning wheel on, the breakdown is as follows; clearly, your character is Rose, Jack is your virtual private network the titanic is your computer, and finally, the iceberg is the internet.

Why is it that the iceberg is considered to be the symbol of the internet and not the ocean? It may be attributed to depth and not width, but I didn’t coin the idea so don’t ask me.

photo of an iceberg
The captain of the titanic saw this and kept sailing forward.
Photo by Jean-Christophe Andre, please support by following @pexel.com

Web in Layers

I’m just going to make the assumption that everyone in the world has some point or another in their life spent some time on the internet. Rather it is shopping online, checking emails, looking for that special someone, or…filtering through their list of pronouns.

We have all spent time on this portion of the internet which is called the “surface web” due to it being readily available to the public. Making this portion of the internet or the iceberg to be considered “just the tip”. What are the other portions I can hear you ask? They are deep and dark web.

What’s the difference between the two? The deep web is the middle of the iceberg that includes everything that search engines cannot identify because they are protected with a password or stored behind internet services, so for example, you may have been spending a good portion of your time perusing on the deep web if you have an Amazon or Netflix account.

And for our main event at the bottom of the iceberg which is every emo kid’s wet dream, the dark web, is the hidden collective of internet sites only accessible via a specialized web browser (Tor) used to keep internet activity anonymous and private.

A brief history of the dark web according to the International Monetary Fund, the dark web or also known as “darknet” was created back in the late 90s by two organizations in the US Department of Defense to create an environment of anonymized and encrypted networks that would protect the sensitive communications of US spies.

people at a nightclub
Bob: Did anyone bring the E?
Eric: I got you bro, there’s some ecstasy in my bag.
Bob: I was talking about the Ethernet cord.
Photo by Edoardo Tommasini, please support by following @pexel.com

Darknet Clubbing

Aside from protecting America’s greatest spies and turning into a nightclub for hackers, what can be done on the dark web you may be asking? Well, pretty much anything you can think of.

The list is as follows but is not limited to; conducting black markets for stolen identity, selling of weapons, prostitution, sex trafficking, and the last thing you thought the internet would be used for since we still have corners on the block, the slinging of dope.

Do you want to perform a DDoS (Distributed Denial of Service)? Purchasing botnets on the dark web will help you perform this form of cyber-attack. You can also download files from the dark web however, they are more likely to come with a nasty array of surprises in the form of a virus, malware, spyware, ransomware, trojans, and many other devious files that could harm either your computer, bank account or just your life in general.

Now while being on the dark web sounds like a normal day in Camden New Jersey, just know, being present there is legal however, the activity you take part in begs the question if you’re joining the dark side or not.

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

young man surfing.
Sailing would be so much easier if I had a boat.
Photo by Vladimir Kudinov, please support by following @pexel.com

Freedom not Allowed

So, having access to the dark web, why is this part of the iceberg so important? Well, as mentioned before, joining the dark side because they have candy, will grant you anonymity making you and your activities harder to trace.

This helps you avoid government censorship if you live in a country where freedom is a no-no and provides you with some privacy. An example of this would be if you wanted to watch a movie or show that you don’t have access to within your country, you could simply “sail the seas to find your booty”.

Translation: you would have a VPN to change your location to the region where you would have access to said viewing. Finding out all this information may have you terrified and asking if your information is being sold on the dark web and Buddha only knows what people are looking to do with it. If that is the case, then you can venture to the “Have I been Pwned”(HIBP)website to see if your information is doing the cupid shuffle.

young man in a hoodie grayscale
Not every hacker wears a hoodie…it’s only the serious ones.
Photo by mohamed faramawy, please support by following @pexel.com

Hacking Above to Depth Below

Now, if all this being on the dark web has you in Mr. Robot mode and you want to catch the bad guys or even play one part-time, there are careers in cyber security that can land you in the dark web.

Getting a degree helps but is not required since you have to display the ability to handle given situations versus sitting in a lecture hall letting valuable hacking time pass you by. Obtaining Security+ and acquiring certificates via online courses or boot camps will get you to depth faster.

Other certifications later acquired like the Certified Information Systems Security Professional (CISSP) could see you higher up career-wise and in-depth iceberg-wise.

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you feel like I may have missed something about the dark-web? Script a comment below.