FormBook: Widely Distributed Infostealer for Credential Theft and Surveillance

FormBook is a Windows-based info-stealer and keylogger first seen in the wild in 2016, sold as a malware-as-a-service (MaaS) tool on underground forums. It is designed to steal browser credentials, log keystrokes, capture screenshots, and exfiltrate data to remote servers. Despite being taken down in 2020, its code lives on in variants like XLoader, and FormBook campaigns remain a persistent threat in phishing and malspam operations.

Introduction to FormBook

FormBook became popular due to its affordable pricing, ease of use, and ability to evade detection. It spread through malicious email attachments, typically containing Office documents, PDFs, or ZIP archives with embedded scripts or executables. Once installed, it operates silently in the background, targeting stored credentials, clipboard contents, and other sensitive data.


1. How FormBook Works

Infection Mechanism:
FormBook is typically delivered via:

Payload Execution:
Once executed, FormBook:


2. History and Notable Campaigns

Origin and Discovery:
FormBook first appeared in 2016, with widespread distribution by 2017. It was advertised on dark web forums as a cheap, reliable info-stealer targeting Windows systems.

Notable Campaigns:


3. Targets and Impact

Targeted Victims and Sectors:

Consequences:


4. Technical Details

Payload Capabilities:

Evasion Techniques:


5. Preventing FormBook Infections

Best Practices:

Recommended Security Tools:


6. Detecting and Removing FormBook

Indicators of Compromise (IoCs):

Removal Steps:

  1. Use a modern antivirus or EDR to perform a full scan
  2. Delete identified payloads and associated registry keys
  3. Reset all credentials used on the infected machine
  4. Monitor for secondary infections that may have been dropped alongside
  5. Reimage the system if full cleanup cannot be guaranteed

Professional Help:
If sensitive data was stolen or lateral movement is suspected, engage an incident response team for containment and forensics.


7. Response to a FormBook Infection

Immediate Steps:


8. Legal and Ethical Implications

Legal Considerations:
FormBook may result in data breach reporting obligations under laws like GDPR or HIPAA if credentials or PII were compromised. Legal teams should be involved if sensitive or corporate accounts were accessed.

Ethical Considerations:
As a cheap and easy-to-use stealer, FormBook contributed to the commodification of cybercrime, enabling even low-skill attackers to cause significant harm through theft and surveillance.


9. Resources and References


10. FAQs about FormBook

Q: What is FormBook malware?
A Windows info-stealer that captures keystrokes, screenshots, and saved credentials, sold as malware-as-a-service.

Q: How does it spread?
Primarily via phishing emails with malicious attachments or links.

Q: Is it still active?
The original service was shut down in 2020, but its code lives on in malware like XLoader.

Q: What does it steal?
Passwords, cookies, keystrokes, clipboard data, and screenshots.


11. Conclusion

FormBook was one of the most widely used info-stealers of its time, offering powerful surveillance tools in an easy-to-use package. While its core service has been disrupted, the techniques and code it pioneered continue in successor malware. Defending against threats like FormBook means staying alert to phishing attempts, avoiding unsafe downloads, and using robust endpoint protection.

 

 

« Back to the Virus Information Library

« Back to the Security Center