

Oracle Acknowledges Security Incident on Outdated Servers
April 10, 2025
Multiple Microsoft Products Vulnerabilities
April 10, 2025
Oracle Acknowledges Security Incident on Outdated Servers
April 10, 2025
Multiple Microsoft Products Vulnerabilities
April 10, 2025Severity
Medium
Analysis Summary
FormBook is an infostealer malware that was first identified in 2016. It tracks and monitors keystrokes, finds and accesses files, takes screenshots, harvests passwords from various browsers, drops files, and downloads, and executes stealthier malware in response to orders from a command-and-control server (C2).
Formbook is known for its versatility, as it can be customized to target specific systems or applications. It is also designed to evade detection by security software, using techniques such as code obfuscation and encryption.
It disguises its original payload and injects itself into legitimate processes to avoid detection and complicate the removal process. The cybercriminals behind these email campaigns used a variety of distribution techniques to deliver this malware, including PDFs, Office Documents, ZIP, RAR, etc. This malware was used by cyber threat actors to attack Ukrainian targets in 2022 during the conflict between Russia and Ukraine. Currently, it is believed that the virus known as XLoader is Formbook's successor.
To protect against Formbook and other malware, it is important to keep software up-to-date, use strong passwords, and be cautious when downloading software or opening email attachments. Antivirus and anti-malware software can also help detect and remove Formbook infections.
Impact
- Credential Theft
- Data Theft
- Keystroke Logging
Indicators of Compromise
MD5
c5681b082c29a3332396a0cff54f24a6
300d711c7ff786f299b7e9916fb756b8
1437d6560dc0892085647761a2a068df
7100093580229ef1295135083f12b382
SHA-256
53fbed42c919ae2818899979a637b0d9d9b7df437ee239c2bc60945053b9ed07
078dbed6d7330ddd5e69ae308e8e8225c57164b4ca050cbca9804bbc97809933
e4afc111da0b341b56b99014d4dc77a706aba033025a1bbc50215c91f7c9a7c2
63c2a6f100f1e83e542185c2f7115a4fd1708271232b6da8395e1f6958691852
SHA1
ff83e0008793376d57fcba544eb7d28304a127c3
121c348da6e701830be0be2bb5a6d80dee0aa9ba
aa9acd675985c9ae9d68ff8933cf11170a25db85
859648677d5d85d553297afe2770fe39214f3483
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Enable two-factor authentication (2FA) on your accounts adds an extra layer of security and can help prevent unauthorized access even if your login credentials have been stolen.
- Regularly backing up your important data can help ensure that you don't lose any critical information in the event of a malware infection or other data loss event.
- Be wary of emails, attachments, and links from unknown sources. Also, avoid downloading software from untrusted sources or clicking on suspicious ads or pop-ups.
- Make sure all of your software, including your operating system and applications, is up-to-date with the latest security patches. This can help prevent vulnerabilities that could be exploited by malware.