New Attack Shows Weaponized PDF Files Remain a Threat

  /     /     /  
Publicated : 23/11/2024   Category : security


New Attack Shows Weaponized PDF Files Remain a Threat


Notable new infection chain uses PDF to embed malicious files, load remote exploits, shellcode encryption, and more, new research shows.



When it comes to packaging malware, the file format of choice remains Microsoft Word or Excel, but a recent attack using a PDF file to lure in victims caught the attention of researchers.
The campaign
— 
observed by HP Wolf Security

sent the
malicious PDF
as an email attachment. Once opened, it used a variety of tactics to evade detection, embed malicious files, load remote exploits, and shellcode encryption, according to the researchers.
Embedding files, loading remotely hosted exploits, and encrypting shellcode are just three techniques attackers use to run malware under the radar, the HP Wolf team reported on the
malicious PDF attack 
in a recent blog post. The exploited vulnerability in this campaign (CVE-2017-11882) is over four years old, yet continues being used, suggesting the exploit remains effective for attackers.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
New Attack Shows Weaponized PDF Files Remain a Threat