• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • About
  • Structure
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackey

FORMBOOK MALWARE TARGETS US DEFENSE CONTRACTORS, AEROSPACE AND MANUFACTURING SECTORS

October 10, 2017 by Fraser G 1 Comment

FormBook Malware Targets US Defense Contractors, Aerospace and Manufacturing Sectors

This article from Threatpost.com details Formbook, a malware that can be spread in PDFs, DOCS and XLS files. The malware has been on sale since July for the low price of $29/week. It is primarily a data stealing tool, and can be used as for keylogging, stealing info from HTTP sessions and saving clipboard contents.  FireEye has a report on it here.  The report states that the malware isnt unique in the way it operates, howevber,  “its relative ease of use, affordable pricing structure, and open availability make FormBook an attractive option for cyber criminals.”

The FireEye report includes a list of Formbook targets, wherein 33% of attacks were targeting Aerospace and Defense contractors:

 

I thought this was an interesting story and report due to the apparent “script kiddie” nature of Formbook. It would be interesting to hear from industry veterans about their experiences with increased accessibility of malware like Formbook, how serious these threats are, and where the world is headed as more people are able to find and use these tools.

 

 

Filed Under: Week 06: Sniffers Tagged With:

Reader Interactions

Comments

  1. Jonathan Duani says

    October 10, 2017 at 5:47 pm

    This is a really interesting article. I think that the biggest thing was the people that they were going after. IT was people who most likely had higher level security clearance and could cause information that if, in the wrong hands could be a really big problem.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (33)
  • Week 01: Overview (2)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (11)
  • Week 04: Vulnerability Scanning (14)
  • Week 05: System and User Enumeration (13)
  • Week 06: Sniffers (17)
  • Week 07: NetCat and HellCat (17)
  • Week 08: Social Engineering, Encoding and Encryption (21)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (17)
  • Week 11: SQL Injection (13)
  • Week 12: Web Services (18)
  • Week 13: Evasion Techniques (13)
  • Week 14: Review of all topics (11)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in