Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Crypto Exchange Grinex Blames Western Spies for $13m Theft

April 21, 2026

OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident

April 21, 2026

Formbook Malware Campaign Uses Multiple Obfuscation Techniques

April 20, 2026
Facebook X (Twitter) Instagram
Tuesday, April 21
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Formbook Malware Campaign Uses Multiple Obfuscation Techniques
News

Formbook Malware Campaign Uses Multiple Obfuscation Techniques

Team-CWDBy Team-CWDApril 20, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Two phishing campaigns, each using a different stealthy infection technique, are targeting organizations in attacks which aim to deliver data stealing malware to devices running on Microsoft Windows.

The goal of the campaigns is to install Formbook, a notorious form of infostealer which has been available as part of malware-as-a-service schemes since 2016.

The infostealer malware is designed to gather sensitive information including login credentials, browser data and screenshots. It is also equipped with advanced evasion techniques to avoid detection.

Ten years on from its initial release, Formbook is still an active cyber threat to organizations across a range of industries, with no sign of slowing down.

Cybersecurity threat researchers at WatchGuard have detailed at least two new Formbook campaigns.

As detailed in a blog post published on April 20, Formbook campaigns have been spotted targeting companies in Greece, Spain, Slovenia, Bosnia, Croatia and a range of countries in South America. The phishing lures appear to be disguised as common forms of business emails.

“What makes these campaigns especially noteworthy is not just the malware itself, but the diversity of methods used to evade detection and abuse legitimate software and trusted system processes,” said Watchguard.

DLL Sideloading and Obfuscated JavaScript

Both Formbook campaigns begin with phishing emails, but use different methods to hide and deliver the malware payload: one uses dynamic-link library (DLL) sideloading and while the other uses obfuscated JavaScript

The first campaign begins with a phishing email which uses an RAR file containing four files: three of them are DLLs, and one of them is a Windows Executable file (EXE).

By using DLL sideloading, a technique deployed by attackers which is used to execute malicious code by tricking a program into loading a harmful DLL instead of a legitimate one, the attackers can run a malicious payload while avoiding the system identifying it as malicious or unusual.

Meanwhile, a second campaign utilizes a different tactic for delivering Formbook malware. The initial stage is once again a phishing email, but this time the malicious payload is hidden inside JavaScript and PDF files, which uses obfuscated code to help it hide from detection.

When executed, the JavaScript drops two image files, which in turn drop PowerShell commands, obfuscated within long strings of code, which are ultimately used to run a Windows executable, which deploys a custom malware loader.

Forms of malware which have previously been identified as being distributed by this loader include Remcos, XWorm, AsyncRAT, and SmokeLoader. In this instance it is being used to distribute the same Formbook malware which is delivered by the first phishing campaign.

“Security teams should monitor for suspicious archive-based email attachments, anomalous DLL loading behavior, PowerShell execution tied to user-opened attachments, and signs of manual DLL mapping or direct syscall activity in memory,” advised WatchGuard.

“By correlating these behaviors across the attack chain, organizations can improve their ability to detect and stop FormBook infections before sensitive data is compromised,” the company added.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads
Next Article OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident
Team-CWD
  • Website

Related Posts

News

Crypto Exchange Grinex Blames Western Spies for $13m Theft

April 21, 2026
News

OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident

April 21, 2026
News

CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads

April 20, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

November 27, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views
Our Picks

‘What happens online stays online’ and other cyberbullying myths, debunked

September 11, 2025

It’s all fun and games until someone gets hacked

September 26, 2025

Is Poshmark safe? How to buy and sell without getting scammed

February 19, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.