www.zdnet.com Open in urlscan Pro
2a04:4e42:4d::666  Public Scan

URL: https://www.zdnet.com/article/this-malware-spreading-pdf-uses-a-sneaky-file-name-to-trick-the-unwary/
Submission: On May 11 via manual from CA — Scanned from CA

Form analysis 1 forms found in the DOM

<form class="c-smartSearch_form"><input aria-label="Search" placeholder="What are you looking for?" type="search" autocomplete="off" aria-autocomplete="list" aria-activedescendant="" aria-controls="c-searchSmartSearchResults" name="query" value="">
  <button type="submit"><span class="search-go">Go</span> <svg>
      <use xlink:href="#arrow-thin" aria-hidden="false"></use>
    </svg></button></form>

Text Content

/>
X

Trending
 * What is ChatGPT and why does it matter? Here's what you need to know
 * Apple sets June date for its biggest conference of 2023, with headset launch
   expected
 * What is Lemon8 and why is everyone talking about it on TikTok?
 * The best AI art generators: DALL-E 2 and other fun alternatives to try
 * ChatGPT's intelligence is zero, but it's a revolution in usefulness, says AI
   expert
 * 

 * ZDNET Recommends
 * Testing RFID blocking cards: Do they work? Do you need one?
 * This almost-great Raspberry Pi alternative is missing one key feature
 * This $75 dock turns your Mac Mini into a Mac Studio (sort of)
 * Samsung's Galaxy S23 Plus is the Goldilocks of Smartphones
 * 

 * Mobile World Congress 2023
 * Best massage chairs
 * Best iRobot vacuums
 * Best headphones for sleeping
 * Best smart treadmills
   

Tech
 * Gaming
 * Headphones
 * Laptops
 * Mobile Accessories
 * Networking
 * PCs
 * 

 * Printers
 * Smartphones
 * Smart Watches
 * Speakers
 * Streaming Devices
 * Streaming Services
 * 

 * Tablets
 * TVs
 * Wearables
 * 

 * Kitchen & Household
 * Office Furniture
 * Office Hardware & Appliances
 * Smart Home
 * Smart Lighting
 * Yard & Outdoors
   

Innovation
 * Artificial Intelligence
 * AR + VR
 * Cloud
 * Digital Transformation
 * Energy
 * 

 * Robotics
 * Sustainability
 * Transportation
 * Work Life
 * 

 * Accelerate your tech game Paid Content
 * How the New Space Race Will Drive Innovation
 * How the metaverse will change the future of work and society
 * 

 * Managing the Multicloud
 * The Future of the Internet
 * The New Rules of Work
 * The Tech Trends to Watch in 2023
   

Business
 * See all Business
 * Amazon
 * Apple
 * Developer
 * E-Commerce
 * 

 * Edge Computing
 * Enterprise Software
 * Executive
 * Google
 * Microsoft
 * 

 * Professional Development
 * Social Media
 * SMB
 * Windows
 * 

 * Digital transformation: Trends and insights for success
 * Software development: Emerging trends and changing roles
   

Security
 * See all Security
 * Cyber Threats
 * Password Manager
 * Ransomware
 * VPN
 * 

 * Cybersecurity: Let's get tactical
 * Securing the Cloud
   

Advice
 * Deals
 * How-to
 * Product Comparisons
 * Product Spotlights
 * Reviews
   

Buying Guides
 * See all Buying Guides
 * Best all-in-one computers
 * Best budget TVs
 * Best gaming CPUs
 * Best gaming laptops
 * Best gaming PCs
 * 

 * Best headphones
 * Best iPads
 * Best iPhones
 * Best laptops
 * Best large tablets
 * Best OLED TVs
 * 

 * Best robot vacuum mops
 * Best rugged tablets
 * Best Samsung phones
 * Best smart rings
 * Best smartphones
 * Best smartwatches
 * 

 * Best speakers
 * Best tablets
 * Best travel VPNs
 * Best TVs
 * Best VPNs
   

tomorrow belongs to those who embrace it today
 * Asia
 * Australia
 * Europe
 * India
 * United Kingdom
 * United States
   

 * ZDNET France
 * ZDNET Germany
 * ZDNET Korea
 * ZDNET Japan
   

Go

Most Popular



 * See all Topics
 * Finance
 * Education
 * Health
   

 * Special Features
 * ZDNET In Depth
 * ZDNET Recommends
   

 * Newsletters
 * Videos
 * Editorial Guidelines
   

 * Trending
   What is ChatGPT and why does it matter? Here's what you need to know Apple
   sets June date for its biggest conference of 2023, with headset launch
   expected What is Lemon8 and why is everyone talking about it on TikTok? The
   best AI art generators: DALL-E 2 and other fun alternatives to try ChatGPT's
   intelligence is zero, but it's a revolution in usefulness, says AI expert
   ZDNET Recommends Testing RFID blocking cards: Do they work? Do you need one?
   This almost-great Raspberry Pi alternative is missing one key feature This
   $75 dock turns your Mac Mini into a Mac Studio (sort of) Samsung's Galaxy S23
   Plus is the Goldilocks of Smartphones
   Mobile World Congress 2023 Best massage chairs Best iRobot vacuums Best
   headphones for sleeping Best smart treadmills

 * Tech
   Gaming Headphones Laptops Mobile Accessories Networking PCs
   Printers Smartphones Smart Watches Speakers Streaming Devices Streaming
   Services
   Tablets TVs Wearables
   Kitchen & Household Office Furniture Office Hardware & Appliances Smart Home
   Smart Lighting Yard & Outdoors

 * Innovation
   Artificial Intelligence AR + VR Cloud Digital Transformation Energy
   Robotics Sustainability Transportation Work Life
   Accelerate your tech game Paid Content How the New Space Race Will Drive
   Innovation How the metaverse will change the future of work and society
   Managing the Multicloud The Future of the Internet The New Rules of Work The
   Tech Trends to Watch in 2023

 * Business
   See all Business Amazon Apple Developer E-Commerce
   Edge Computing Enterprise Software Executive Google Microsoft
   Professional Development Social Media SMB Windows
   Digital transformation: Trends and insights for success Software development:
   Emerging trends and changing roles

 * Security
   
   
   See all Security Cyber Threats Password Manager Ransomware VPN
   Cybersecurity: Let's get tactical Securing the Cloud

 * Advice
   
   
   Deals How-to Product Comparisons Product Spotlights Reviews

 * Buying Guides
   See all Buying Guides Best all-in-one computers Best budget TVs Best gaming
   CPUs Best gaming laptops Best gaming PCs
   Best headphones Best iPads Best iPhones Best laptops Best large tablets Best
   OLED TVs
   Best robot vacuum mops Best rugged tablets Best Samsung phones Best smart
   rings Best smartphones Best smartwatches
   Best speakers Best tablets Best travel VPNs Best TVs Best VPNs

 * More
   
   See all Topics Finance Education Health
   Special Features ZDNET In Depth ZDNET Recommends
   Newsletters Videos Editorial Guidelines

Tech
Home Tech Security


THIS MALWARE-SPREADING PDF USES A SNEAKY FILE NAME TO TRICK THE UNWARY

Researchers find a malware campaign that uses file-naming trickery to get
victims to download malicious files from the internet.
Written by Liam Tung, Contributing Writer on May 23, 2022

 * 
 * 
 * 
 * 
 * 


MUST READ

Every hardware product Google just announced at I/O 2023

Read now
x






Replay video Large play-pause toggle
Play pause

00:00 00:00 Live
Closed captions Share Fullscreen





Attackers using the Snake keylogger malware for Windows are emailing malicious
PDFs with embedded Word documents to infect victims' PCs and steal information. 

Malicious PDFs are an unusual tool to use today because attackers prefer Office
formats like Word and Excel that are more familiar to PC users, according to
threat analysts at HP's Wolf Security, who recently discovered the PDF malware
campaign. 




PRIVACY

 * How to delete yourself from internet search results and hide your identity
   online
 * The best browsers for privacy
 * Samsung's smartphone 'Repair Mode' stops technicians from viewing your photos
 * Are period tracking apps safe?

The malicious PDF was used to infect PCs with Snake, a keylogger and credential
stealer that was first spotted in late November 2020, according to HP. 

SEE: Just in time? Bosses are finally waking up to the cybersecurity threat

The attackers sent email with an attached PDF document named "REMMITANCE
INVOICE.pdf" with an embedded Word document named "has been verified. However
PDF, Jpeg, xlsx, .docs". 

The reason for choosing this odd and actually rather sneaky file name for the
Word document becomes clear when viewing the prompt that Adobe Reader displays
when checking whether the user approves opening this file. 

The prompt reads: "The file 'has been verified. However PDF, Jpeg, xlsx, .docs'
may contain programs, macros, or viruses that could potentially harm your
computer."



An employee who hastily reads the notice could mistakenly understand that the
file in question has been verified and is safe to open. 

Should the recipient then select "Open this file", Microsoft Word opens. As HP
notes, if Protected View is disabled, Word downloads a Rich Text Format (.rtf)
file from a web server, which is then run in the context of the open document.
(It should be noted that Microsoft Office opens documents from the internet in
Protected View or Application Guard for Office by default.)

Upon analyzing the Word document, HP's analysts found an illegitimate URL from
which an external object linking and embedding (OLE) object was loaded. The OLE
object also contains shellcode that exploits the CVE-2017-11882, which is an old
remote code execution vulnerability in Microsoft Office Equation Editor that's
still popular with hackers.  




The shellcode downloads an executable called fresh.exe that is in fact the Snake
keylogger, which has historically been distributed via malicious RFT documents
or archive files attached to emails.  

"While Office formats remain popular, this campaign shows how attackers are also
using weaponized PDF documents to infect systems. Embedding files, loading
remotely-hosted exploits and encrypting shellcode are just three techniques
attackers use to run malware under the radar. The exploited vulnerability in
this campaign (CVE-2017-11882) is over four years old, yet continues being used,
suggesting the exploit remains effective for attackers," HP notes. 

SECURITY


These experts are racing to protect AI from hackers. Time is running out

Fraudsters are using machine learning to help write scam emails in different
languages

How to find and remove spyware from your phone

The best VPN services: How do the top 5 compare?

How to find out if you are involved in a data breach -- and what to do next

 * 
   These experts are racing to protect AI from hackers. Time is running out
 * 
   Fraudsters are using machine learning to help write scam emails in different
   languages
 * 
   How to find and remove spyware from your phone
 * 
   The best VPN services: How do the top 5 compare?
 * 
   How to find out if you are involved in a data breach -- and what to do next

Editorial standards
Show Comments
Log In to Comment Community Guidelines




x

player version3.2.1stream typeHLSplayback state1duration43.209832current
time5.19buffer length43.21average dropped (fps)0.00playback framerate
(fps)0.00switching modeautotransition statestartstart index bitrate
(B/s)-0.00kcurrent index bitrate (B/s)573.80kcurrent bandwidth (B/s)0.00k

you can use from virtually anywhere on earth.


Replay video Large play-pause toggle
Play pause

00:05 00:43 Live
Closed captions Share Fullscreen



Learn More

Click to unmute



RELATED




CHATGPT AND THE NEW AI ARE WREAKING HAVOC ON CYBERSECURITY IN EXCITING AND
FRIGHTENING WAYS




NEW GOOGLE SEARCH TOOL WILL DISTINGUISH REAL IMAGES FROM AI-GENERATED PHONIES




SINGAPORE PITCHES NEW LAW TO SLOW SPREAD OF CYBERCRIME









ZDNET
we equip you to harness the power of disruptive innovation, at work and at home.
 * Topics
 * Galleries
 * Videos
 * Do Not Sell or Share My Personal Information

 * about ZDNET
 * Meet The Team
 * Sitemap
 * Reprint Policy

 * Join
   |
   Log In
 * Newsletters
 * Site Assistance
 * Licensing

 * 
 * 
 * 
 * 
 * 
 * 

© 2023 ZDNET, A Red Ventures company. All rights reserved. Privacy Policy |
Cookie Settings
| Advertise | Terms of Use
Cookie Settings