<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>ISO on bubka hacks stuff</title><link>https://hexpysya.github.io/tags/iso/</link><description>Recent content in ISO on bubka hacks stuff</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Mon, 13 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://hexpysya.github.io/tags/iso/index.xml" rel="self" type="application/rss+xml"/><item><title>ELK-BumbleBee - GOLD CABIN</title><link>https://hexpysya.github.io/blue_team/elk-bumblebee---gold-cabin/</link><pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/elk-bumblebee---gold-cabin/</guid><description>An employee at CompliantSecure received a phishing email from emkei.cz, downloaded a malicious ISO containing BumbleBee loader 23.dll, which established C2 to 3.68.97.124 and injected into ImagingDevices.exe, dumped LSASS credentials, laterally moved to DC01 via PsExec using markw credentials, staged AdFind and AnyDesk, created sql_admin backdoor account, moved to FileServer01 and Support01, exfiltrated archived share data, and deployed Conti ransomware dropping R3ADM3.txt ransom notes.</description></item></channel></rss>