PAN-OS Bug Enables Root Command Execution
June 29, 2025PAN-OS Bug Enables Root Command Execution
June 29, 2025Severity
Medium
Analysis Summary
FormBook is an infostealer malware that was first identified in 2016. It tracks and monitors keystrokes, finds and accesses files, takes screenshots, harvests passwords from various browsers, drops files, and downloads, and executes stealthier malware in response to orders from a command-and-control server (C2).
Formbook is known for its versatility, as it can be customized to target specific systems or applications. It is also designed to evade detection by security software, using techniques such as code obfuscation and encryption.
It disguises its original payload and injects itself into legitimate processes to avoid detection and complicate the removal process. The cybercriminals behind these email campaigns used a variety of distribution techniques to deliver this malware, including PDFs, Office Documents, ZIP, RAR, etc. This malware was used by cyber threat actors to attack Ukrainian targets in 2022 during the conflict between Russia and Ukraine. Currently, it is believed that the virus known as XLoader is Formbook's successor.
To protect against Formbook and other malware, it is important to keep software up-to-date, use strong passwords, and be cautious when downloading software or opening email attachments. Antivirus and anti-malware software can also help detect and remove Formbook infections.
Impact
- Credential Theft
- Data Theft
- Keystroke Logging
Indicators of Compromise
MD5
cd7b01183c1e16fe719681e231ea393e
121eff4c2fe4d9f38bc071958e3ffcb2
31b1accd4c2b0f4a3e09ab064e0f773a
SHA-256
07897be894f90e837ac00edd367ff159c9f9153749743aa699e471a7d07f7ce4
decd2ba8000d6b737349007d3ea62099b6265af0ff2473e9cb43b36345b30847
4ca09577ca7a54a21f0f823fffeac8b5dd3d10bb9e0df385e4cd8da670b0843a
SHA1
9f4a241725690db793aca8bf22674ed53b378862
67604d298580c5a3d13dde7b12a6ef249f0c6654
20b1ea1807d291845a542059f2fd57aecd3d626d
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Enable two-factor authentication (2FA) on your accounts adds an extra layer of security and can help prevent unauthorized access even if your login credentials have been stolen.
- Regularly backing up your important data can help ensure that you don't lose any critical information in the event of a malware infection or other data loss event.
- Be wary of emails, attachments, and links from unknown sources. Also, avoid downloading software from untrusted sources or clicking on suspicious ads or pop-ups.
- Make sure all of your software, including your operating system and applications, is up-to-date with the latest security patches. This can help prevent vulnerabilities that could be exploited by malware.