{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreic73nqvlazqsvnx6mrmb54dayognwrhxfysje6c4jpffkjep32aya",
    "uri": "at://did:plc:iir655mcoipvnewhnkv6fb3u/app.bsky.feed.post/3metqvwemlod2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreiajqklukpmr4r2q5cpgitkps52jwzvrtu5jttwmpv2ednbmrtk56i"
    },
    "mimeType": "image/png",
    "size": 93255
  },
  "path": "/2025/11/04/from-bing-search-to-ransomware-bumblebee-and-adaptixc2-deliver-akira-2/",
  "publishedAt": "2026-02-14T19:18:39.000Z",
  "site": "https://thedfirreport.com",
  "tags": [
    "article"
  ],
  "textContent": "\nOverview Bumblebee malware has been an initial access tool used by threat actors since late 2021. In 2023 the malware was first reported as using SEO poisoning as a delivery mechanism. Recently in May of 2025 Cyjax reported on a campaign using this method again, impersonating various IT tools. We observed a similar campaign in […]",
  "title": "From Bing Search to Ransomware: Bumblebee and AdaptixC2 Deliver Akira"
}