{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreic73nqvlazqsvnx6mrmb54dayognwrhxfysje6c4jpffkjep32aya",
"uri": "at://did:plc:iir655mcoipvnewhnkv6fb3u/app.bsky.feed.post/3metqvwemlod2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreiajqklukpmr4r2q5cpgitkps52jwzvrtu5jttwmpv2ednbmrtk56i"
},
"mimeType": "image/png",
"size": 93255
},
"path": "/2025/11/04/from-bing-search-to-ransomware-bumblebee-and-adaptixc2-deliver-akira-2/",
"publishedAt": "2026-02-14T19:18:39.000Z",
"site": "https://thedfirreport.com",
"tags": [
"article"
],
"textContent": "\nOverview Bumblebee malware has been an initial access tool used by threat actors since late 2021. In 2023 the malware was first reported as using SEO poisoning as a delivery mechanism. Recently in May of 2025 Cyjax reported on a campaign using this method again, impersonating various IT tools. We observed a similar campaign in […]",
"title": "From Bing Search to Ransomware: Bumblebee and AdaptixC2 Deliver Akira"
}