Microsoft Addresses Critical Azure AI Face Service Vulnerability with a CVSS Score of 9.9
February 4, 2025Multiple Google Chrome Vulnerabilities
February 5, 2025Microsoft Addresses Critical Azure AI Face Service Vulnerability with a CVSS Score of 9.9
February 4, 2025Multiple Google Chrome Vulnerabilities
February 5, 2025Severity
Medium
Analysis Summary
FormBook is an infostealer malware that was first identified in 2016. It tracks and monitors keystrokes, finds and accesses files, takes screenshots, harvests passwords from various browsers, drops files, and downloads, and executes stealthier malware in response to orders from a command-and-control server (C2).
Formbook is known for its versatility, as it can be customized to target specific systems or applications. It is also designed to evade detection by security software, using techniques such as code obfuscation and encryption.
It disguises its original payload and injects itself into legitimate processes to avoid detection and complicate the removal process. The cybercriminals behind these email campaigns used a variety of distribution techniques to deliver this malware, including PDFs, Office Documents, ZIP, RAR, etc. This malware was used by cyber threat actors to attack Ukrainian targets in 2022 during the conflict between Russia and Ukraine. Currently, it is believed that the virus known as XLoader is Formbook's successor.
To protect against Formbook and other malware, it is important to keep software up-to-date, use strong passwords, and be cautious when downloading software or opening email attachments. Antivirus and anti-malware software can also help detect and remove Formbook infections.
Impact
- Credential Theft
- Data Theft
- Keystroke Logging
Indicators of Compromise
MD5
2c69ec0bd7c4c195a7b6e01274ca4ddf
734231d1654ce8b46f869e7819b143e3
86c532b1132630146227a27f3179d897
67fd60143ae84701c0051626d03855dc
SHA-256
b2fe57ff7504883c1a5050ccf0a6cfe45087a43bea4ce92aec075be6f1852a29
6da0e6f30c344f1bf21e4e24f3682587e005d4eef92b153bde25f94b70dbbc05
6be92b0d491f6d5d7f65e01a3336aac1155f091ad6def08b541e07b68eda3bb4
3e450314d79f3aabb655b5f79fbb31629b27954d9d7d8ba2190dc2ee65997d7a
SHA1
3346a47b05e495951316a54315716599f48a29f4
fa500245d6ccd4d29c39c84a291043df0d6316a8
8bd4224bf2079d60e6fef9e40ab7bc1ea391315a
996ffcd65414b15e8f6eb72dc3e4f2b286a4f034
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Enable two-factor authentication (2FA) on your accounts adds an extra layer of security and can help prevent unauthorized access even if your login credentials have been stolen.
- Regularly backing up your important data can help ensure that you don't lose any critical information in the event of a malware infection or other data loss event.
- Be wary of emails, attachments, and links from unknown sources. Also, avoid downloading software from untrusted sources or clicking on suspicious ads or pop-ups.
- Make sure all of your software, including your operating system and applications, is up-to-date with the latest security patches. This can help prevent vulnerabilities that could be exploited by malware.