XLoader: FormBook Successor Turned Cross-Platform Infostealer for Windows and macOS

XLoader is a commercial infostealer and keylogger derived from the FormBook malware family, designed to extract credentials, log keystrokes, take screenshots, and exfiltrate data. First spotted in 2020, it quickly gained traction as a malware-as-a-service (MaaS) tool and later expanded its functionality to target macOS in addition to Windows. Its combination of low cost, wide availability, and active development has made it a popular choice for threat actors seeking quick access to stolen data.

Introduction to XLoader

Originally based on FormBook’s codebase, XLoader rebranded with a more extensive feature set and a web-based control panel, making it easier for less skilled attackers to deploy. It spreads through malicious email attachments, cracked software, and fake installers, often posing as benign applications. Once installed, XLoader operates quietly in the background, siphoning off data and transmitting it to attacker-controlled servers.


1. How XLoader Works

Infection Mechanism:
XLoader typically spreads through:

Payload Execution:
After execution, XLoader:


2. History and Notable Campaigns

Origin and Discovery:
XLoader emerged in 2020, marketed as the successor to FormBook, which had been discontinued. In 2021, security researchers discovered a macOS version being sold for as little as $49/month, highlighting its accessibility.

Notable Campaigns:


3. Targets and Impact

Targeted Victims and Sectors:

Consequences:


4. Technical Details

Payload Capabilities:

Evasion Techniques:


5. Preventing XLoader Infections

Best Practices:

Recommended Security Tools:


6. Detecting and Removing XLoader

Indicators of Compromise (IoCs):

Removal Steps:

  1. Run a full system scan with an updated antivirus or malware removal tool
  2. On macOS, inspect and remove unknown LaunchAgents or apps in ~/Library
  3. Clear browser-stored passwords and reset credentials
  4. Reboot and re-scan to confirm successful removal
  5. Consider full OS reinstall on heavily compromised systems

Professional Help:
If system-level compromise occurred or credentials were stolen, consult a forensics or incident response team for remediation and impact assessment.


7. Response to a XLoader Infection

Immediate Steps:


8. Legal and Ethical Implications

Legal Considerations:
Stolen credentials may lead to data breaches requiring disclosure under data privacy laws like GDPR or CCPA. Victims may be liable for any fraud committed using their stolen credentials.

Ethical Considerations:
XLoader commodifies surveillance and theft, enabling virtually anyone to harvest sensitive data. Its availability and low cost highlight how malware-as-a-service continues to lower the barrier to cybercrime.


9. Resources and References


10. FAQs about XLoader

Q: What is XLoader malware?
A cross-platform infostealer that evolved from FormBook, designed to steal credentials, capture keystrokes, and exfiltrate data from Windows and macOS systems.

Q: How does it spread?
Primarily through phishing emails and malicious attachments, as well as fake installers.

Q: Is XLoader still active?
Yes — it continues to be sold and updated on underground forums, with Windows and macOS versions in circulation.

Q: Can XLoader be removed?
Yes, but all compromised credentials should be reset immediately after cleaning the system.


11. Conclusion

XLoader represents the evolution of consumer-grade info-stealers into cross-platform threats. Its roots in FormBook and its reach across macOS and Windows make it particularly dangerous for users who think their platform is immune. The best protection is prevention: avoid suspicious downloads, use secure authentication, and deploy endpoint protection capable of catching stealthy data theft.

 

 

« Back to the Virus Information Library

« Back to the Security Center