Cybercriminals flood online forums with malicious Microsoft Excel files

Trojan
(Image credit: wk1003mike / Shutterstock)

Websites with contact forms and comment sections, as well as discussion forums, are being used to distribute a known password-stealing malware through a compromised Microsoft Excel file.

According to a new report from Bleeping Computer, an unnamed cybercrime group has been spamming contact forms and discussion boards of various sites for the past two weeks, with fake offers such as advertising requests, gift guides for the holiday season, or website promotions. 

For some of the lures, the attackers stole the identities of popular brands, created fake websites and hosted a malicious Excel XLL file on them. 

Be extra careful with XLL files

The XLL files are similar to a DLL file, with the addition of an ‘xlAutoOpen’ function run by Excel. This function (an add-in, basically) allows Excel to read and write data, import it from other sources, create custom functions and perform different tasks. 

In this particular instance, the function downloads and installs RedLine malware. RedLine is an infostealer that harvests cookies, login credentials, and credit card information stored in web browsers. It can also grab FTP usernames and passwords, execute commands, download and activate additional malware, as well as grab screenshots of active Windows screens. 

If the victim installs RedLine, it will search for valuable intel on Chrome, Edge, Firefox, Brave, and Opera, and send all of the gathered information to its command&control servers, where the operators would most likely sort, and sell the data on the black market. 

XLL files are executables which, generally speaking, makes them a potentially dangerous file type. Users should be extra careful when receiving these files, and should make sure they are getting the files from a trusted source before proceeding and running them. 

XLL files are rarely sent as attachments, Bleeping Computer reminds, saying that they’re usually installed through another program, or via the Windows administrator. Thus, any such file that comes in the mail should be handled with extra care.

Aside from being vigilant with attachments and links in emails, users should also make sure to keep their endpoints secure with strong and refreshed passwords, as well as that their system runs safeguards, such as antivirus solutions and firewalls.

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
Microsoft 365 accounts are under attack from new malware spoofing popular work apps
Trojan
Hackers hide malware into website images to go unnoticed
A hacker typing on a MacBook laptop with code on the screen.
This devious phishing site repurposes legitimate web elements like CAPTCHA pages for malware distribution
A concept image of someone typing on a computer. A red flashing danger sign is above the keyboard and nymbers and symbols also in glowing red surround it.
Fake Reddit sites found pushing Lumma Stealer malware
A concept image of someone typing on a computer. A red flashing danger sign is above the keyboard and nymbers and symbols also in glowing red surround it.
Microsoft Teams and other Windows tools hijacked to hack corporate networks
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Microsoft reveals over a million PCs hit by malvertising campaign
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
L-mount alliance
Sirui joins L-Mount Alliance to deliver its superb budget lenses for Leica, DJI, Sigma and Panasonic cameras
Security padlock and circuit board to protect data
Trust in digital services around the world sees a massive drop as security worries continue
Samuel and Romy standing very close together in A24's Babygirl movie
Everything new on Max in April 2025, including A24's Babygirl and The Last of Us season 2
An AMD Radeon RX 9070 XT made by Sapphire on a table with its retail packaging
AMD’s secret weapon against Nvidia seems to be stock – way more RX 9070 GPUs are rumored to be hitting shelves than RTX 5000 models
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
Seth Milchick and Kier Eagan's animatronic speaking in Severance season 2 episode 10
Apple TV+ announces Severance has been renewed for season 3 after that devastating finale