What is Form Book?
We are talking about malware that is part of what is known as infostealer. This type of malware is characterized by stealing valuable information for the victims, and logically this information collects it from our computers and mobile phones, which are the main vehicle for information of interest to hackers, who use them to access all of it. The most precious information for cybercriminals are undoubtedly the credentials, which give access to our accounts, mainly bank accounts, which in turn gives them carte blanche to enter and empty our accounts.
hackers too can you take screenshots of our phone thanks to this malware. What can potentially also reveal all kinds of information that appears on the mobile screen and that can be useful, either to steal those credentials, or to extort us with sensitive information. It is malware that, before spreading through our mobiles, does so on the Deep Web, in different forums where hackers exchange malicious software.
Phishing is your great ally
As with so many other malware, the Phishing is the most efficient way to get Formbook to PCs and mobiles of the victims. Using this method, legitimate-looking emails hide links to URLs that have been created to impersonate the appearance of well-known companies and platforms. This leads victims to lower their guard and click on links where we download this malware almost without realizing it. Once this happens, it is the moment in which hackers take control of our phone in the background, obtaining the necessary data to extort us later, or simply to impersonate our identity by accessing our accounts.
Within these emails, in addition to links to malicious applications, we find executable files, which usually affect computers more than our mobiles. By executing these files, they end up infecting web browsers, which then become an open book with all our activity. Finally, one of its great dangers is that it can use techniques of keylogging, which allows criminals to know what keys we have pressed at all times, and therefore find out what our credentials are on different platforms and services. It must be said that this malware has already surpassed Emotet as the most sadly popular on the market, which shows that it is working and infecting more and more devices and operating systems. The best way to avoid it is to be extremely careful about the different attachments that can arrive in the emails we receive.