Wednesday, March 5, 2025
HomeCyber Security NewsHackers Embed Weaponized Word File into a PDF to Evade Detection

Hackers Embed Weaponized Word File into a PDF to Evade Detection

Published on

SIEM as a Service

Follow Us on Google News

To avoid detection, hackers employed a new method dubbed “MalDoc in PDF” to insert a malicious Word file into a PDF file.

Despite having magic numbers and a PDF-specific file format, a file created with MalDoc in PDF may be opened in Word.

If the file includes a configured macro, running it in Word causes VBS to launch and carry out malicious operations.

The attacks that JPCERT/CC reported used the “.doc” file extension. If Windows has the “.doc” extension associated with Word, the MalDoc in the PDF-created file will open as a Word document.

Dump view of MalDoc in PDF

“The attacker adds an mht file created in Word with a macro attached after the PDF file object and saves it. The created file is recognized as a PDF file in the file signature, but it can also be opened in Word”, JPCERT/CC said in its blog.

Analysis of the Attack

Likely, PDF analysis tools like pdfid won’t be able to detect the malicious components in a file prepared using MalDoc. 

It should also be noted that this file exhibits unintended behaviors when accessed in Word; however, malicious behaviors cannot be verified when it is opened in PDF readers, etc. Since the file is recognized as a PDF file, current antivirus or sandbox tools may not detect it.

pdfid’s analysis results

“This technique does not bypass the setting that disables auto-execution in Word macros,” the JPCERT/CC team noted.

Nevertheless, if you are doing automated malware analysis using specific tools, sandboxes, etc. You should be cautious about the detection findings, as the files are recognized as PDFs.

Keep informed about the latest Cyber Security News by following us on Google NewsLinkedinTwitter, and Facebook.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Alli AI Announces Upcoming Public Launch of AI-Powered Content Creation Platform

AI Soft has announced the upcoming public release of Alli AI, an advanced artificial...

CISA Issues Alert on Actively Exploited VMware Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) escalated warnings on March 4, 2025,...

Cisco Webex for BroadWorks Flaw Opens Door for Attackers to Access Credentials

Cisco Systems has disclosed a security vulnerability in its Webex for BroadWorks unified communications...

Over 10,000 WordPress Sites Exposed by Donation Plugin Code Execution Vulnerability

A critical security flaw in the widely used GiveWP – Donation Plugin and Fundraising Platform has...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

CISA Issues Alert on Actively Exploited VMware Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) escalated warnings on March 4, 2025,...

Cisco Webex for BroadWorks Flaw Opens Door for Attackers to Access Credentials

Cisco Systems has disclosed a security vulnerability in its Webex for BroadWorks unified communications...

Over 10,000 WordPress Sites Exposed by Donation Plugin Code Execution Vulnerability

A critical security flaw in the widely used GiveWP – Donation Plugin and Fundraising Platform has...