101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

485
active users

#formbook

0 posts0 participants0 posts today

🚨 0-day vibes from 2017? Yup, it’s still happening.

A malicious Excel file using CVE-2017-0199 is out here in 2025 dropping FormBook like it's a fresh mixtape.

The attack chain?

  • Macro-free Excel
  • Weaponized with remote .hta
  • Payload: Info-stealer FormBook

Despite being 7+ years old, this vuln still slaps in phishing campaigns — because patching is apparently a myth.

Full technical breakdown by @FortiGuardLabs: fortinet.com/blog/threat-resea

TL;DR for blue teamers:

  • Watch your egress traffic
  • Harden Office apps
  • Monitor LOLBins (Living Off the Land Binaries)
  • Block outbound to shady IPs faster than your memes go viral

Don’t let your org get dunked on by a 2017 CVE in 2025. That’s not a good look.

Found this user on the @internetarchive hosting images with embedded base64 encoded #malware between <<BASE64_START>> and <<BASE64_END>> flags. The malware is used to download an inject the next stage payload into another process. The campaign I observed involved #RemcosRAT

User page: archive.org/details/@nodetecto
Remcos: hxxps://petshopsirena[.]mk/a.txt
#c2 : 45.95.169[.]135:2404

I found samples dropping others such as #agenttesla and #formbook as well.

archive.orgInternet Archive: Digital Library of Free & Borrowable Books, Movies, Music & Wayback Machine

Hey there! I stumbled upon a fresh sample of Formbook info-stealer malware. During analysis I found this malware hides its payload into a vulnerable WordPress website.
Read the article to know more.
#FormBook #Stealer #MalwareAnalysis #MalwareResearch #CTI #ThreatIntel #InfoSec ashishranax.github.io/posts/Fo

Ashish Rana · FormBook Malware - The Uninvited Guest of WordPressIntroduction

From a post I wrote for my employer at linkedin.com/posts/unit42_jinx and twitter.com/Unit42_Intel/statu

2023-11-29 (Wednesday): Email --> #JinxLoader --> #Formbook/#XLoader

IOCs available at github.com/PaloAltoNetworks/Un

Of note, #JinxLoader is a relatively new malware service first posted to hackforums[.]net on 2023-04-30.

A #pcap of the infection traffic, copy of the email, and the associated malware/artifacts are available at malware-traffic-analysis.net/2

2023-07-04 (Tuesday) - 30 Days of #Formbook: Day 30, version 4.1 "MF6W" - #pcap of the infection, associated malware sample, and IOCs available at malware-traffic-analysis.net/2

And that's it! I've finished what I set out to do: generate 30 consecutive days of Formbook infections.

As mentioned before, 30 days of Formbook is really too many days of Formbook. But it's still out there, and new samples still appear in the wild on a near-daily basis.