Cyber security news for all

More

    Login data can be stolen with a prepared PDF document

    Many users see PDF document as a supposedly secure data exchange format for invoices, contracts and forms compared to office suites with their macro viruses and other exploits. Security researchers dealed with the PDF standard as part of Black Hat 2020 and found numerous implementation problems of the sometimes ambiguous standard as well as security traps in daily use.

    PDF Files Make The Computer Unusable

    For this purpose, some experts manipulated PDF documents on social media platforms like Twitter with an editor. The result: it can use simple endless loops, which increase the CPU load when opening or that are just a few bytes long and are embedded in the PDF, but which take up several gigabytes after opening.

    PDF document
    Attackers can make modifications to the document and change the visibility of the hidden content

    To get to user passwords, hackers use a network share as a file path, which they start as a print job. This allows them to steal the user name in order to transport it to any URL on the internet via a URL backchannel. This means that login data can also be stolen with a prepared PDF document. The hash only needs to be cracked using known methods. And if the victim uses a VPN or a cloud package, the attacker can also use it to log into the company’s infrastructure in many cases.

    In addition, a hacker can use PDF documents to manipulate any file that the user has write access to. Experts also found an option for remote code execution with which an attacker can execute any code smuggled in the PDF on the target system. It regards all attacks that require user interaction as having failed: Often, a preview in the file manager is sufficient to carry out the attack. You can check whether your PDF reader is vulnerable to Shadow Attacks and update if necessary.

    Recent Articles

    Unclear cyber attacks that target Covid-19 vaccine campaign

    Security researchers have discovered some cyber attacks that are targeted against the delivery of vaccine against COVID. The targeted attacks began in 2 months...

    New malware called Egregor is on the rise

    New malware is on the rise. The Egregor malware has only been in active for 2 months, but it is already becoming apparent that...

    Anyone with a smartphone can become a victim of cyber-mobbing

    Cyber-mobbing is becoming a huge risk in the current COVID crisis. According to a study, almost 20 percent of students in Germany are exposed...

    macOS Trojans: Traces lead to Vietnam

    Security researchers have discovered a new macOS Trojans. Behind this could be a well known hacker group that has spied on Vietnamese dissidents in...

    Court forces Tutanota to perform a surveillance function

    Tutanota email only stores its user mails in encrypted form and cannot read them itself. Tutanota is one of the few email providers that...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox