Cyber Attack

UNC2970 Hackers Attacking Job Seekers Using Weaponized PDF Reader

UNC2970, a North Korean cyber espionage group, used customized SumatraPDF trojans to deliver MISTPEN backdoors to victims through phishing emails pretending to be job recruiters. 

The group targeted the energy and aerospace industries, copying job descriptions and engaging with victims via email and WhatsApp.

It modifies job descriptions to target specific victims in U.S. critical infrastructure, which aim to align the job requirements with the victim’s profile and target senior-level employees to gain access to confidential information.

Decoding Compliance: What CISOs Need to Know – Join Free Webinar

Researchers found a malicious archive with a fake job PDF targeting the energy sector. The PDF omitted specific details from the legitimate job description to avoid suspicion. 

Original vs. modified

The victim opened a malicious ZIP archive containing a PDF lure and a trojanized SumatraPDF component. The trojan, upon system reboot, executes the MISTPEN backdoor, compromising the victim’s system.

The trojanized PDF viewer program, based on the open-source SumatraPDF project, exploited a vulnerability in the modified code to execute malicious code when a specific PDF file was opened.

The SumatraPDF executable loads a trojanized libmupdf.dll file, which decrypts the BAE job description PDF and loads a backdoor named MISTPEN, which is a modified Notepad++ plugin that writes an encrypted backdoor to disk and creates a scheduled task to execute it daily using BdeUISrv.exe and wtsapi32.dll.

Infection lifecycle diagram

An analysis reveals that BURNBOOK, a malicious launcher, leverages a modified SumatraPDF DLL as a payload. Triggered by opening a PDF lure, the DLL decrypts and writes the encrypted payload to disk. 

The PDF lure contains the encryption key and nonce necessary for decryption, as the encrypted PDF file embedded within a larger file is decrypted in chunks using the ChaCha20 cipher initialized with key and nonce extracted from the container.

The embedded PDF file is decrypted using the cipher

After reaching a specific offset, the function reads the size of the encrypted backdoor DLL and decrypts it using the ChaCha20 cipher, which is then loaded into SumatraPDF.exe’s memory for execution.  

The malware persists by copying files to %APPDATA% and re-encrypts the backdoor code with the same key and nonce, saving it to Thumbs.ini, and then schedules a daily task to execute the backdoor.

MISTPEN, a C-based backdoor, downloads and executes PE files after decrypting a token with a hardcoded AES key to communicate with Microsoft Graph APIs for potential data exfiltration.

The backdoor can execute PE payloads, terminate the process, sleep for specified intervals, or hibernate with updated sleep times, sending corresponding messages to its C2 to indicate status or completion.

A pseudocode representation of the malicious code in wtsapi32.dll

The malware hijacks BdeUISrv.exe’s DLL search order to load TEARPAGE, a loader that decrypts a ChaCha20-encrypted backdoor DLL from %APPDATA%\Thumbs.ini.

The decrypted backdoor, MISTEPN, is then reflectively loaded into BdeUISrv.exe’s memory space and executed.

Mandiant analysis reveals MISTPEN malware evolution with added persistence, configuration saving, and improved C2 infrastructure compared to earlier versions.

UNC2970, a North Korean cyber espionage group, uses job-themed phishing emails to deliver malicious archives via WhatsApp, targeting victims in various countries, which is similar to UNC4034’s past actions and aligns with their interest in strategic intelligence.

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14-day free trial

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

Cisco Nexus Vulnerability Allows Attackers to Inject Malicious Commands

Cisco Systems has issued a critical security advisory for a newly disclosed command injection vulnerability…

1 hour ago

New Wi-Fi Jamming Attack Can Disable Specific Devices

A newly discovered Wi-Fi jamming technique enables attackers to selectively disconnect individual devices from networks…

1 hour ago

GitLab Vulnerabilities Allow Attackers to Bypass Security and Run Arbitrary Scripts

GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform that…

3 hours ago

LibreOffice Flaws Allow Attackers to Run Malicious Files on Windows

A high-severity security vulnerability (CVE-2025-0514) in LibreOffice, the widely used open-source office suite, has been…

3 hours ago

Cisco Nexus Switch Vulnerability Allows Attackers to Cause DoS

Cisco Systems has disclosed a high-severity vulnerability (CVE-2025-20111) in its Nexus 3000 and 9000 Series…

4 hours ago

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver Fox,…

13 hours ago