www.mcafee.com
Open in
urlscan Pro
104.102.58.198
Public Scan
URL:
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/pdf-phishing-beyond-the-bait/
Submission: On December 05 via api from TR — Scanned from DE
Submission: On December 05 via api from TR — Scanned from DE
Form analysis
4 forms found in the DOMhttps://www.mcafee.com/blogs
<form class="desktop-search-form-v2" action="https://www.mcafee.com/blogs">
<div><span class="search_icon_desktop"> <img src="/blogs/wp-content/themes/securingtomorrow-brillio/img/new-icons/search_icon_black.svg" alt="search grey icon"> </span></div>
<div class="desktop-search-div"><input class="dsk-search" autocomplete="off" name="s" type="text" placeholder="Search"></div>
</form>
https://www.mcafee.com/blogs
<form class="desktop-search-form" style="display: none;" action="https://www.mcafee.com/blogs">
<div class="desktop-search-div"><input class="dsk-search" autocomplete="off" name="s" type="text" placeholder="Type and hit enter..."></div>
<div><span class="close_icon_desktop"> <img src="https://www.mcafee.com/blogs/wp-content/themes/securingtomorrow-brillio/img/new-icons/cross-grey-icon.svg" alt="close grey icon"> </span></div>
</form>
https://www.mcafee.com/blogs
<form class="form-inline my-2 my-lg-0" action="https://www.mcafee.com/blogs">
<div class="input-group mb-3 search-div">
<div class="input-group-append"><button class="sarch-btn" type="button"><span class="fa fa-search" title="Type and hit enter..."><span style="display: none;">.</span></span> </button>
</div>
</div>
</form>
https://www.mcafee.com/blogs
<form action="https://www.mcafee.com/blogs" class="desktop-search-form" style="display: none;">
<div class="desktop-search-div">
<input class="dsk-search" name="s" type="text" placeholder="Type and hit enter..." autocomplete="off">
</div>
<div><span class="close_icon_desktop">
<img src="https://www.mcafee.com/blogs/wp-content/themes/securingtomorrow-brillio/img/new-icons/cross-grey-icon.svg" alt="close grey icon">
</span>
</div>
</form>
Text Content
* Products * All-In-One Protection Recommended * NEW! McAfee+ Products Worry-free protection for your privacy, identity and all your personal devices. Individual and family plans * NEW! McAfee+ Ultimate Our most comprehensive privacy, identity and device protection with $2M ID theft coverage. * Total Protection Protection for your devices with identity monitoring and VPN * Device Protection * Antivirus * Virtual Private Network (VPN) * Mobile Security * Free Tools & Downloads * Web Protection * Free Antivirus Trial * Device Security Scan * Other Services * PC Optimizer * Techmaster Concierge * Virus Removal * Features * Keep Me Private Online * Personal Data Cleanup * VPN (Virtual Private Network) * Safeguard My Identity * Identity Monitoring * Security Freeze * Identity Theft Coverage & Restoration * Password Manager * Protect My Devices * Antivirus * Web Protection * Protect My Family * Protection Score * Parental Controls * About Us * Our Company * Company Overview * Awards & Reviews * Investors * Our Efforts * Inclusion & Diversity * Integrity & Ethics * Public Policy * Join Us * Careers * Life at McAfee * Our Teams * Our Locations * Resources * Stay Updated * McAfee Blog * Reports and Guides * McAfee Labs * McAfee on YouTube * Learn More * Learn at McAfee * What is Antivirus? * What is a VPN? * What is Identity Theft? * Press & News * McAfee Newsroom * Why McAfee Products Recommended All-In-One Protection NEW! McAfee+ Products Worry-free protection for your privacy, identity and all your personal devices. Individual and family plans NEW! McAfee+ Ultimate Our most comprehensive privacy, identity and device protection with $2M ID theft coverage. Total Protection Protection for your devices with identity monitoring and VPN Device Protection Antivirus Virtual Private Network (VPN) Mobile Security Free Tools & Downloads Web Protection Free Antivirus Trial Device Security Scan Other Services PC Optimizer Techmaster Concierge Virus Removal Features Keep Me Private Online Personal Data Cleanup VPN (Virtual Private Network) Safeguard My Identity Identity Monitoring Security Freeze Identity Theft Coverage & Restoration Password Manager Protect My Devices Antivirus Web Protection Protect My Family Protection Score Parental Controls About Us Our Company Company Overview Awards & Reviews Investors Our Efforts Inclusion & Diversity Integrity & Ethics Public Policy Join Us Careers Life at McAfee Our Teams Our Locations Resources Stay Updated McAfee Blog Reports and Guides McAfee Labs McAfee on YouTube Learn More Learn at McAfee What is Antivirus? What is a VPN? What is Identity Theft? Press & News McAfee Newsroom Why McAfee Support Help Customer Support Support Community FAQs Contact Us Activation Activate Retail Card Choose Region Sign in * Support * Help * Customer Support * Community * FAQs * Contact Us * Activation * Activate Retail Card * * Sign in * * Blog * Topics Internet Security Mobile Security Family Safety Privacy & Identity Protection Security News Tips & Tricks * At McAfee McAfee News Executive Perspectives McAfee Labs Life at McAfee Hackable? Podcast * English * Portuguese (BR) * Spanish * French(FR) * German * Italian * Japanese * French(CA) * Portuguese (PT) * Spanish (MX) * * Blog * Topics Internet Security Mobile Security Family Safety Privacy & Identity Protection Security News Tips & Tricks * At McAfee McAfee News Executive Perspectives McAfee Labs Life at McAfee Hackable? Podcast * . * Portuguese (BR) Spanish French(FR) German Italian Japanese French(CA) Portuguese (PT) Spanish (MX) Blog Other Blogs McAfee Labs PDF Phishing: Beyond the Bait PDF PHISHING: BEYOND THE BAIT McAfee Labs Dec 04, 2023 6 MIN READ By Lakshya Mathur & Yashvi Shah Phishing attackers aim to deceive individuals into revealing sensitive information for financial gain, credential theft, corporate network access, and spreading malware. This method often involves social engineering tactics, exploiting psychological factors to manipulate victims into compromising actions that can have profound consequences for personal and organizational security. Over the last four months, McAfee Labs has observed a rising trend in the utilization of PDF documents for conducting a succession of phishing campaigns. These PDFs were delivered as email attachments. Attackers favor using PDFs for phishing due to the file format’s widespread trustworthiness. PDFs, commonly seen as legitimate documents, provide a versatile platform for embedding malicious links, content, or exploits. By leveraging social engineering and exploiting the familiarity users have with PDF attachments, attackers increase the likelihood of successful phishing campaigns. Additionally, PDFs offer a means to bypass email filters that may focus on detecting threats in other file formats. The observed phishing campaigns using PDFs were diverse, abusing various brands such as Amazon and Apple. Attackers often impersonate well-known and trusted entities, increasing the chances of luring users into interacting with the malicious content. Additionally, we will delve into distinct types of URLs utilized by attackers. By understanding the themes and URL patterns, readers can enhance their awareness and better recognize potential phishing attempts. Figure 1 – PDF Phishing Geo Heatmap showing McAfee customers targeted in last 1 month DIFFERENT THEMES OF PHISHING Attackers employ a range of corporate themes in their social engineering tactics to entice victims into clicking on phishing links. Notable brands such as Amazon, Apple, Netflix, and PayPal, among others, are often mimicked. The PDFs are carefully crafted to induce a sense of urgency in the victim’s mind, utilizing phrases like “your account needs to be updated” or “your ID has expired.” These tactics aim to manipulate individuals into taking prompt action, contributing to the success of the phishing campaigns. Below are some of the examples: Figure 2 – Fake Amazon PDF Phish Figure 3 – Fake Apple PDF Phish Figure 4 – Fake Internal Revenue Service PDF Phish Figure 5 – Fake Adobe PDF Phish Below are the stats on the volume of various themes we have seen in these phishing campaigns. Figure 6 – Different themed campaign stats based on McAfee customers hits in last 1 month ABUSE OF LINKEDIN AND GOOGLE LINKS Cyber attackers are exploiting the popular professional networking platform LinkedIn and leveraging Google Apps Script to redirect users to phishing websites. Let us examine each method of abuse individually. In the case of LinkedIn, attackers are utilizing smart links to circumvent Anti-Virus and other security measures. Smart links are integral to the LinkedIn Sales Navigator service, designed for tracking and marketing business accounts. Figure 7 – LinkedIn Smart link redirecting to an external website By employing these smart links, attackers redirect their victims to phishing pages. This strategic approach allows them to bypass traditional protection measures, as the use of LinkedIn as a referrer adds an element of legitimacy, making it more challenging for security systems to detect and block malicious activity. In addition to exploiting LinkedIn, attackers are leveraging the functionality of Google Apps Script to redirect users to phishing pages. Google Apps Script serves as a JavaScript-based development platform used for creating web applications and various other functionalities. Attackers embed malicious or phishing code within this platform, and when victims access the associated URLs, it triggers the display of phishing or malicious pages. Figure 8 – Amazon fake page displayed on accessing Google script URL As shown in Figure 8, when victims click on the “Continue” button, they are subsequently redirected to a phishing website. Summary Crafting highly convincing PDFs mimicking legitimate companies has become effortlessly achievable for attackers. These meticulously engineered PDFs create a sense of urgency through skillful social engineering, prompting unsuspecting customers to click on embedded phishing links. Upon taking the bait, individuals are redirected to deceptive phishing websites, where attackers request sensitive information. This sophisticated tactic is deployed on a global scale, with these convincing PDFs distributed to thousands of customers worldwide. Specifically, we highlighted the increasing use of PDFs in phishing campaigns over the past four months, with attackers adopting diverse themes such as Amazon and Apple to exploit user trust. Notably, phishing tactics extend to popular platforms like LinkedIn, where attackers leverage smart links to redirect victims to phishing pages, evading traditional security measures. Additionally, Google Apps Script is exploited for its JavaScript-based functionality, allowing attackers to embed malicious code and direct users to deceptive websites. Remediation Protecting oneself from phishing requires a combination of awareness, caution, and security practices. Here are some key steps to help safeguard against phishing: * Be Skeptical: Exercise caution when receiving unsolicited emails, messages, or social media requests, especially those with urgent or alarming content. * Verify Sender Identity: Before clicking on any links or providing information, verify the legitimacy of the sender. Check email addresses, domain names, and contact details for any inconsistencies. * Avoid Clicking on Suspicious Links: Hover over links to preview the actual URL before clicking. Be wary of shortened URLs, and if in doubt, verify the link’s authenticity directly with the sender or through official channels. * Use Two-Factor Authentication (2FA): Enable 2FA whenever possible. This adds an extra layer of security by requiring a second form of verification, such as a code sent to your mobile device. McAfee provides coverage against a broad spectrum of active phishing campaigns, offering protection through features such as real-time scanning and URL filtering. While it enhances security against various phishing attempts, users must remain vigilant and adopt responsible online practices along with using McAfee. INTRODUCING MCAFEE+ Identity theft protection and privacy for your digital life Download McAfee+ Now Stay Updated Follow us to stay updated on all things McAfee and on top of the latest consumer and mobile security threats. McAfee Labs Threat Research Team McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information. MORE FROM MCAFEE LABS Previous PEELING BACK THE LAYERS OF REMCOSRAT MALWARE Authored by Preksha Saxena McAfee labs observed a Remcos RAT campaign where malicious VBS files were delivered... Aug 29, 2023 | 9 MIN READ CRYPTO SCAM: SPACEX TOKENS FOR SALE Authored by: Neil Tyagi Scam artists know no bounds—and that also applies to stealing your cryptocurrency. Crypto... Aug 24, 2023 | 5 MIN READ INVISIBLE ADWARE: UNVEILING AD FRAUD TARGETING ANDROID USERS Authored by SangRyol Ryu, McAfee Threat Researcher We live in a world where advertisements are everywhere, and... Aug 04, 2023 | 6 MIN READ THE SEASON OF BACK TO SCHOOL SCAMS Authored by: Lakshya Mathur and Yashvi Shah As the Back-to-School season approaches, scammers are taking advantage of... Aug 02, 2023 | 5 MIN READ BENEATH THE SURFACE: HOW HACKERS TURN NETSUPPORT AGAINST USERS NetSupport malware variants have been a persistent threat, demonstrating adaptability and evolving infection techniques. In this technical... Nov 27, 2023 | 12 MIN READ FAKE ANDROID AND IOS APPS STEAL SMS AND CONTACTS IN SOUTH KOREA Authored by Dexter Shin Most people have smartphones these days which can be used to easily search... Nov 15, 2023 | 10 MIN READ UNMASKING ASYNCRAT NEW INFECTION CHAIN Authored by Lakshya Mathur & Vignesh Dhatchanamoorthy AsyncRAT, short for “Asynchronous Remote Access Trojan,” is a sophisticated... Nov 03, 2023 | 7 MIN READ TOP 5 THINGS TO KNOW ABOUT RECENT IOT ATTACKS While the IoT offers tremendous benefits, such as allowing users to monitor their homes or check the... Nov 02, 2023 | 6 MIN READ SHORT-URL SERVICES MAY HIDE THREATS Short-URL services have emerged as a crucial part of the way we use the Internet. With the... Oct 25, 2023 | 7 MIN READ YOUR SMART COFFEE MAKER IS BREWING UP TROUBLE A smart coffee maker, like other smart appliances, connects to your home network, offering convenience features such... Oct 25, 2023 | 6 MIN READ EXPLORING WINRAR VULNERABILITY (CVE-2023-38831) Authored by Neil Tyagi On 23 August 2023, NIST disclosed a critical RCE vulnerability CVE-2023-38831. It is... Sep 19, 2023 | 8 MIN READ AGENT TESLA’S UNIQUE APPROACH: VBS AND STEGANOGRAPHY FOR DELIVERY AND INTRUSION Authored by Yashvi Shah Agent Tesla functions as a Remote Access Trojan (RAT) and an information stealer... Sep 08, 2023 | 13 MIN READ PEELING BACK THE LAYERS OF REMCOSRAT MALWARE Authored by Preksha Saxena McAfee labs observed a Remcos RAT campaign where malicious VBS files were delivered... Aug 29, 2023 | 9 MIN READ CRYPTO SCAM: SPACEX TOKENS FOR SALE Authored by: Neil Tyagi Scam artists know no bounds—and that also applies to stealing your cryptocurrency. Crypto... Aug 24, 2023 | 5 MIN READ INVISIBLE ADWARE: UNVEILING AD FRAUD TARGETING ANDROID USERS Authored by SangRyol Ryu, McAfee Threat Researcher We live in a world where advertisements are everywhere, and... Aug 04, 2023 | 6 MIN READ THE SEASON OF BACK TO SCHOOL SCAMS Authored by: Lakshya Mathur and Yashvi Shah As the Back-to-School season approaches, scammers are taking advantage of... Aug 02, 2023 | 5 MIN READ BENEATH THE SURFACE: HOW HACKERS TURN NETSUPPORT AGAINST USERS NetSupport malware variants have been a persistent threat, demonstrating adaptability and evolving infection techniques. In this technical... Nov 27, 2023 | 12 MIN READ FAKE ANDROID AND IOS APPS STEAL SMS AND CONTACTS IN SOUTH KOREA Authored by Dexter Shin Most people have smartphones these days which can be used to easily search... Nov 15, 2023 | 10 MIN READ UNMASKING ASYNCRAT NEW INFECTION CHAIN Authored by Lakshya Mathur & Vignesh Dhatchanamoorthy AsyncRAT, short for “Asynchronous Remote Access Trojan,” is a sophisticated... Nov 03, 2023 | 7 MIN READ TOP 5 THINGS TO KNOW ABOUT RECENT IOT ATTACKS While the IoT offers tremendous benefits, such as allowing users to monitor their homes or check the... Nov 02, 2023 | 6 MIN READ SHORT-URL SERVICES MAY HIDE THREATS Short-URL services have emerged as a crucial part of the way we use the Internet. With the... Oct 25, 2023 | 7 MIN READ YOUR SMART COFFEE MAKER IS BREWING UP TROUBLE A smart coffee maker, like other smart appliances, connects to your home network, offering convenience features such... Oct 25, 2023 | 6 MIN READ EXPLORING WINRAR VULNERABILITY (CVE-2023-38831) Authored by Neil Tyagi On 23 August 2023, NIST disclosed a critical RCE vulnerability CVE-2023-38831. It is... Sep 19, 2023 | 8 MIN READ AGENT TESLA’S UNIQUE APPROACH: VBS AND STEGANOGRAPHY FOR DELIVERY AND INTRUSION Authored by Yashvi Shah Agent Tesla functions as a Remote Access Trojan (RAT) and an information stealer... Sep 08, 2023 | 13 MIN READ PEELING BACK THE LAYERS OF REMCOSRAT MALWARE Authored by Preksha Saxena McAfee labs observed a Remcos RAT campaign where malicious VBS files were delivered... Aug 29, 2023 | 9 MIN READ CRYPTO SCAM: SPACEX TOKENS FOR SALE Authored by: Neil Tyagi Scam artists know no bounds—and that also applies to stealing your cryptocurrency. Crypto... Aug 24, 2023 | 5 MIN READ INVISIBLE ADWARE: UNVEILING AD FRAUD TARGETING ANDROID USERS Authored by SangRyol Ryu, McAfee Threat Researcher We live in a world where advertisements are everywhere, and... Aug 04, 2023 | 6 MIN READ THE SEASON OF BACK TO SCHOOL SCAMS Authored by: Lakshya Mathur and Yashvi Shah As the Back-to-School season approaches, scammers are taking advantage of... Aug 02, 2023 | 5 MIN READ Next * 1 * 2 * 3 Back to top * * * * * -------------------------------------------------------------------------------- Corporate Headquarters 6220 America Center Drive San Jose, CA 95002 USA Products McAfee+ McAfee® Total Protection McAfee Antivirus McAfee Safe Connect McAfee PC Optimizer McAfee Techmaster McAfee Mobile Security Resources Antivirus Free Downloads Parental Controls Malware Firewall Blogs Activate Retail Card McAfee Labs Support Customer Support FAQs Renewals Support Community About About McAfee Careers Contact Us Newsroom Investors Legal Terms Your Privacy Choices System Requirements Sitemap -------------------------------------------------------------------------------- United States / English Copyright © 2023 McAfee, LLC United States / English Copyright © 2023 McAfee, LLC ✓ Thanks for sharing! AddToAny More…