PDFs Are Emptying Crypto Wallets!

NEFTURE SECURITY I Blockchain Security
Dissecting Web3
Published in
4 min readOct 26, 2023

A PDF was behind the biggest crypto hack that has ever happened.

Top that!

While people are usually suspicious of downloading files ending with .exe or any files with unfamiliar, random letter combinations, most people are unaware of the risks associated with downloading PDFs.

They tend to perceive PDFs as inert and innocuous files.

Exploiting this widely overlooked threat, scammers, and hacker groups, such as the North Korean state-sponsored Lazarus, have turned PDFs into a tool of choice for hacking.

In today’s article, we will delve into how this is possible and how to mitigate the risks associated with them.

PDFs as a Vector for Cyberattacks

PDF (Portable Document Format) files are widely used for sharing documents due to their ability to preserve the formatting and content across different devices and platforms.

PDF supports links, images and written content, as well as both visible and non-visible types of data.

However, PDFs’ flexibility and cross-platform nature as well as the potential for embedding various types of content make them a potential vector for cyberattacks.

Which can allow them to gain backdoor access to user information and introduces malwares.

Combined with the fact that the majority of people are ignorant of the inherent risks associated with PDFs, they can become the perfect weapon in the hands of malevolent actors, who are not lacking in either imagination or opportunity when it comes to exploiting PDFs to achieve their goals.

Here’s a detailed explanation of how hackers can use PDF files to carry out their malicious activities:

  1. Malicious Attachments: Hackers can attach malicious files (such as executables or scripts) to PDFs. When the unsuspecting user opens the PDF, these attachments can be triggered, leading to the installation of malware on their system.
  2. Embedded Links: PDFs can contain hyperlinks that, when clicked, direct the user to malicious websites. These websites can host malware, phishing pages, or exploit kits that target vulnerabilities in the user’s system.
  3. Exploiting PDF Vulnerabilities: Hackers can take advantage of vulnerabilities in PDF software itself. If a user opens a PDF using a vulnerable version of a PDF viewer, the hacker can execute code that compromises the user’s system.
  4. Hidden Content and Layers: PDFs support layers and hidden content. Hackers can hide malicious content behind seemingly innocuous content. When opened, the hidden content can be revealed and execute malicious actions.
  5. Malicious JavaScript: PDFs can contain JavaScript code that can execute when the PDF is opened. Hackers can use JavaScript to perform actions like downloading malware, stealing user information, or redirecting to malicious websites.
  6. Phishing Attacks: Hackers can craft PDFs that imitate legitimate documents, such as invoices, contracts, or forms. These fake documents may contain links to phishing sites or request sensitive information from the user.
  7. Malicious Macros: Some PDF readers support macros, similar to those found in Microsoft Office documents. Hackers can embed malicious macros in PDFs that, when enabled, can execute code leading to malware infection.
  8. Document Exploitation: Hackers can embed exploits within PDF files that target software vulnerabilities. These vulnerabilities could allow the hacker to take control of the user’s system.
  9. Watering Hole Attacks: In a watering hole attack, hackers compromise a website frequently visited by the target audience. They then inject malicious code into a PDF hosted on the compromised site. When users unknowingly download and open the PDF, their systems could be compromised.
  10. Document Encryption and Passwords: Some hackers send password-protected PDFs via email, claiming the password is provided in the body of the message. Users, in their haste, might enter the password, allowing the hacker to gain access to their system or sensitive information.

How To Protect Yourself Against Them

1.The most important step to protect yourself against this type of attack is to exercise extreme caution when receiving PDFs from individuals about whom you know very little.

PDF-based hacking and scams in the crypto world often involve social engineering.

For example, someone may contact you through platforms like Twitter, Discord, Reddit, or LinkedIn, posing as a potential job opportunity, as seen in the Ronin Hack incident. They might send you a corrupted PDF file with the intent of emptying your wallet.

2. The second measure lies in the tools you use to open your PDFs. Use a secure PDF reader like Adobe Acrobat or view the PDF directly in your web browser without downloading it.

Make sure your PDF viewer and other software are up to date to patch any known vulnerabilities.

Consider disabling JavaScript and unnecessary features in your PDF viewer.

Configure your PDF viewer to display security warnings for potentially unsafe content.

3.The third measure would be to use Security Software. Use reliable antivirus and anti-malware software to scan PDF before enabling you to download it like Norton or Kaspersky.

By taking these steps, you can significantly reduce the risks associated with PDFs and keep your wallet safe.

About us

Nefture is a Blockchain Security Company that secures crypto transactions!

With Nefture Security, within ✨seconds ✨ you can know if your wallet has been compromised and get your wallet security audit for free.

Check if your wallet is compromised nowhttps://www.app.nefture.com/

--

--

NEFTURE SECURITY I Blockchain Security
Dissecting Web3

Nefture secures crypto assets by detecting and mitigating malicious activities and system failures. - nefture.com