Tuesday, November 12, 2024
Homecyber securityPDF Malware Distribution Has Increased by 500%, as Reported by VirusTotal

PDF Malware Distribution Has Increased by 500%, as Reported by VirusTotal

Published on

Malware protection

A new edition of the “VirusTotal Malware Trends Report” series, which focuses mostly on “Emerging Formats and Delivery Techniques,” has been published by VirusTotal to understand the nature of malicious attacks better.

A representative subset of user submissions from January 2021 through the end of June 2023 was utilized for creating all the data in this report.

The attackers are increasingly employing new file types and tactics to circumvent detection. Email attachments continue to be a common means to propagate malware.

- Advertisement - SIEM as a Service

According to reports, campaigns are linked to reported rises of suspicious PDF files. Even while it seems as though the trend has gradually slowed down, it continues to encounter new campaigns in 2023, with the largest peak of suspicious PDF files ever recorded occurring in June 2023.

Also, attackers started adopting OneNote as a trustworthy substitute for macros in other Office applications in 2023, and antivirus (AV) software was originally taken aback by this new format.

 Additionally, there is a rise in the use of ISO files by hackers to disseminate malware, often by attaching them as compressed files that are challenging for security software to analyze.

Emerging Formats and Delivery Techniques

The installation packages for a range of software, including Windows, Telegram, AnyDesk, and malicious CryptoNotepad, are being disguised as ISO files.

Malware Distribution Trends

Despite being a relatively ancient strategy, spreading malware using email attachments experienced a rise in popularity as early as 2022.

To better understand the development of defenses and the efficacy of various social engineering approaches, attackers combine the use of well-known distribution routes for malware with new forms.

Malware Distribution Trends

“We have observed these PDFs being used for various purposes; for example, they could be “weaponized” to exploit a vulnerability, or simply contain a link to a phishing site that requests information”, according to the VirusTotal report.

By 2023, malware that is sent as an email attachment will increasingly be in the OneNote format. In 2023, it emerged as the most potent newcomer attachment format.

It allows attackers to include malicious URLs and other scripting languages, such as JavaScript, PowerShell, Visual Basic Script, and Windows Script, inside the document.

Due to its tremendous adaptability and resourcefulness for attackers, OneNote is now a trustworthy substitute for the traditional usage of macros by attackers in other Office products.

“Malicious OneNote files usually embed a malicious file (vba, html+jscript, PowerShell, or any combination of them) and, as happens with malicious Office attachments, try to convince the victim to allow execution”, reads the report.

Final Thoughts

The security industry must recognize the necessity for alternate file formats for malware transmission, and more effort must be made to thwart these emerging means of infection.

As legitimate websites are frequently used for malware distribution, it is advised that you monitor trends in malware distribution and actively check how your security stack responds to reduce infection risks proactively.

Include all logs to/from allowed legitimate websites in your analysis, and avoid focusing solely on anomalous traffic with your anomaly detection. 

Stay up-to-date with the latest Cyber Security News; follow us on GoogleNewsLinkedinTwitterand Facebook.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and...

Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace

Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS...

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Tor Network Suffers IP Spoofing Attack Via Non-Exit Relays

In late October 2024, a coordinated IP spoofing attack targeted the Tor network, prompting...