Wednesday, April 30, 2025
HomeCyber Security NewsBeware of New Campaign that Delivers Sophisticated Malware Through PDF Files

Beware of New Campaign that Delivers Sophisticated Malware Through PDF Files

Published on

SIEM as a Service

Follow Us on Google News

Recently, the security experts at HP Wolf Security have discovered a new way to use PDF attachments to distribute malware via the internet. In this case, malicious Word documents are delivered through PDF attachments.

It is rather uncommon to receive malicious email attachments in PDF format, as all most often malicious emails are delivered as docx or xls files with embedded malware-loading macros. 

Threat actors are turning to other methods to deploy malicious macros and evade detection as people become aware of the danger of opening Microsoft Office attachments containing malicious macros.

- Advertisement - Google News

Implanting Malicious Word Docs in PDFs

It appears that the email body of the PDF document that arrived by email is filled with vague promises. While the PDF is named “Remittance Invoice,” and based on its title and contents, it appears that the recipient will receive payment. 

The DOCX file contains the same content as the PDF file, therefore Adobe Reader prompts the user to open the DOCX file, which might be confusing to the victim.

The Open File prompt below provides the following information because the threat actors named the embedded document “has been verified”:-

If you receive this message, you would probably feel comfortable opening the file as it has been legitimately validated by Adobe and can be opened safely.

Although malware analysts utilize tools like parsers and scripts to inspect embedded files in PDFs, the average user wouldn’t even know how to start looking at them or know where to start if they receive these tricky e-mails.

A DOCX file is usually opened in Microsoft Word by users in most cases rather than a different program. So, if macros are enabled, DOCX files in Microsoft Word will be downloaded into RTF format from a remote resource.

In the Word file, there is a command embedded with the URL for where the payload is located, which will result in the download of the RTF.

Old RCE Exploitation

It is found that an OLE object has been malformed in the RTF file titled “f_document_shp.doc”, which makes it difficult to analyze. 

HP’s analysts were able to determine that it attempts to exploit a vulnerability in Microsoft Equation Editor in order to run arbitrary code after some targeted reconstruction is done.

In this case, the shellcode is exploiting the following vulnerability:-

  • CVE-2017-11882

Despite being fixed in November 2017, Equation Editor still exhibits a remote code execution vulnerability that must be dealt with immediately if not removed.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Chrome 136 Fixes 20-Year-Old Privacy Bug in Latest Update

Google has begun rolling out Chrome 136 to the stable channel for Windows, Mac,...

Researchers Uncover SuperShell Payloads and Various Tools in Hacker’s Open Directories

Cybersecurity researchers at Hunt have uncovered a server hosting advanced malicious tools, including SuperShell...

Cyber Espionage Campaign Targets Uyghur Exiles with Trojanized Language Software

A sophisticated cyberattack targeted senior members of the World Uyghur Congress (WUC), the largest...

Konni APT Deploys Multi-Stage Malware in Targeted Organizational Attacks

A sophisticated multi-stage malware campaign, potentially orchestrated by the North Korean Konni Advanced Persistent...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Chrome 136 Fixes 20-Year-Old Privacy Bug in Latest Update

Google has begun rolling out Chrome 136 to the stable channel for Windows, Mac,...

Researchers Uncover SuperShell Payloads and Various Tools in Hacker’s Open Directories

Cybersecurity researchers at Hunt have uncovered a server hosting advanced malicious tools, including SuperShell...

Cyber Espionage Campaign Targets Uyghur Exiles with Trojanized Language Software

A sophisticated cyberattack targeted senior members of the World Uyghur Congress (WUC), the largest...