I've read that PDFs are increasingly being used as part of advanced persistent threat attack campaigns. Could you...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
describe some of the latest techniques attackers use in PDF attacks, and can you suggest tools to use for scanning PDFs for malicious inclusions? Or should antimalware/email scans already be picking up on such threats?
Ask the Expert
SearchSecurity.com expert Nick Lewis is standing by to answer your questions about enterprise security threats. Submit your question via email. (All questions are anonymous.)
Advanced persistent threat (APT) attack campaigns are likely using PDF files because most regular users assume they are safe to open, as PDFs are widely accepted in both business and everyday email attachments. By using phishing emails masquerading as fax messages, scans from a multi-function printer, delivery notices, etc., the hacker is hoping to entice the user to open the "trusted"-yet-malicious file.
To mitigate these threats posed by PDF malware, it is critical to combine security awareness and technical controls, since neither method will protect all scenarios on its own.
Simply put, traditional antimalware or email scans will not catch these new PDF malware attacks. However, security tools that open PDFs in a sandbox environment can be used to identify malicious behavior from the PDF.
Dig Deeper on Malware, Viruses, Trojans and Spyware
Related Q&A from Nick Lewis
Malware is increasingly using DNS tunnels to aid in data exfiltration. Expert Nick Lewis explains how the attacks work and how best to defend against...continue reading
Researchers warned about the rise of a new cross-site scripting flaw involving same-origin policy. Expert Nick Lewis explains the vulnerability and ...continue reading
Malware authors are adopting software wrapping to hide malicious code and avoid detection. Expert Nick Lewis explains how to defend against the ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.