{"id":6403,"date":"2017-01-26T18:00:40","date_gmt":"2017-01-27T02:00:40","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/01\/26\/news-240\/"},"modified":"2017-01-26T18:00:40","modified_gmt":"2017-01-27T02:00:40","slug":"news-240","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/01\/26\/news-240\/","title":{"rendered":"Phishers unleash simple but effective social engineering techniques using PDF attachments"},"content":{"rendered":"<p>The <a target=\"_blank\" href=\"http:\/\/time.com\/4638214\/google-phishing-scam\/\">Gmail phishing attack<\/a>\u00a0is reportedly so effective that it tricks even technical users, but it may be just the tip of the iceberg. We\u2019re seeing similarly simple but clever social engineering tactics using PDF attachments.<\/p>\n<p>These deceitful PDF attachments are being used in email phishing attacks that attempt to steal your email credentials. Apparently, the heightened phishing activity that we have come to expect every year during the holiday season has not subsided.<\/p>\n<p>Unlike in other spam campaigns, the PDF attachments we are seeing in these phishing attacks do not contain malware or exploit code. Instead, they rely on social engineering to lead you on to phishing pages, where you are then asked to divulge sensitive information.<\/p>\n<p>At Microsoft Malware Protection Center, we continuously monitor the threat landscape for threats such as these PDF files that arrive via email and execute their payload from the web. We do this, not only so we can create security solutions for the latest threats, but also so we understand cybercriminal\u2019s newest schemes and warn customers.<\/p>\n<p>Awareness is an effective weapon against social engineering. We\u2019re sharing some examples of these PDF attachments, including one that spoofs Microsoft Office, so you are armed with knowledge that you can use to detect these social engineering attacks.<\/p>\n<h2>Example 1: You received a document that Adobe Reader can\u2019t display because it\u2019s a protected Excel file, so you need to enter your email credentials<\/h2>\n<p><strong>Attachment file type<\/strong>: PDF<br \/> <strong>Filename<\/strong>: Quote.pdf<br \/> <strong>Info stolen<\/strong>: Email credentials<br \/> <strong>Windows Defender detection<\/strong>: <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Trojan:Win32\/Pdfphish.BU\">Trojan:Win32\/Pdfphish.BU<\/a><\/p>\n<p>One example of the fraudulent PDF attachments\u00a0is carried by email messages that pretend to be official communication, for instance, a quotation for a product or a service, from a legitimate company. These email messages may spoof actual people from legitimate companies in order to fake authenticity.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"1128\" height=\"955\" class=\"alignnone size-full wp-image-10905\" alt=\"1\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2017\/01\/120.jpg\" \/><\/p>\n<p>When you open the attachment, it\u2019s an actual PDF file that is made to appear like an error message. It contains an instruction to \u201cOpen document with Microsoft Excel\u201d. But it\u2019s actually a link to a website.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"864\" height=\"610\" class=\"alignnone size-full wp-image-10515\" alt=\"pdf-example-1-screenshot-1\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2017\/01\/PDF-example-1-screenshot-1.png\" \/><\/p>\n<p>Clicking the link opens your browser and brings you to a website, where the social engineering attack continues with a message that the document is protected because it is confidential, and therefore you need to sign in with your email credentials.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"1150\" height=\"820\" class=\"alignnone size-full wp-image-10525\" alt=\"pdf-example-1-screenshot-2\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2017\/01\/PDF-example-1-screenshot-2.png\" \/><\/p>\n<p>If you\u2019re using Microsoft Edge, Microsoft SmartScreen will block this website, stopping the phishing attack.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"1198\" height=\"745\" class=\"alignnone size-full wp-image-10915\" alt=\"block1\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2017\/01\/Block1.png\" \/><\/p>\n<p>However. if you\u2019re using a browser that does not block the website and you click OK, you are led to the phishing site, which asks you to enter your email address and password. The website is designed to appear like you are opening an Excel file. The website goes to great lengths to mimic Microsoft Excel Online, but what you see in the site is not an Excel file, but just an image.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"1153\" height=\"823\" class=\"alignnone size-full wp-image-10535\" alt=\"pdf-example-1-screenshot-3\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2017\/01\/PDF-example-1-screenshot-3.png\" \/><\/p>\n<p>If you fall for this social engineering trick and enter your details, you are redirected to the site below, which says you entered your details incorrectly. But at this point, the attackers will have your email credentials. Once they have access to your email, the attackers can launch further phishing attacks against your contacts, or gain access to your social networking, online banking, or online gaming accounts.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"1151\" height=\"821\" class=\"alignnone size-full wp-image-10545\" alt=\"pdf-example-1-screenshot-4\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2017\/01\/PDF-example-1-screenshot-4.png\" \/><\/p>\n<h2>Example 2: You received a PDF file from Dropbox and need to log in using your email credentials<\/h2>\n<p><strong>Attachment file type<\/strong>: PDF<br \/> <strong>Filename<\/strong>: ScannedbyXerox.pdf<br \/> <strong>Info stolen<\/strong>: Gmail, Outlook, AOL, Yahoo!, Office 365 credentials<br \/> <strong>Windows Defender detection<\/strong>: <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=PWS:HTML\/Misfhing.B\">PWS:HTML\/Misfhing.B<\/a><\/p>\n<p>Another example of these PDF attachments put on pretense that you need to sign in to online storage provider Dropbox to access your document. Just like the first example, this PDF document does not have malicious code, but contains a link to \u201cView .PDF online\u201d.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"758\" height=\"835\" class=\"alignnone size-full wp-image-10555\" alt=\"pdf-example-2-screenshot-1\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2017\/01\/PDF-example-2-screenshot-1.png\" \/><\/p>\n<p>Clicking the link takes you to a fake Dropbox login page that gives you options to sign in using your Google, Outlook, AOL, Yahoo!, Office 365 or other email credentials.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"1373\" height=\"863\" class=\"alignnone size-full wp-image-10565\" alt=\"pdf-example-2-screenshot-2\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2017\/01\/PDF-example-2-screenshot-2.png\" \/><\/p>\n<p>Microsoft Edge users are protected from this threat. Using Microsoft SmartScreen, it stops this phishing attack from loading or serving further offending pages.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"1201\" height=\"747\" class=\"alignnone size-full wp-image-10925\" alt=\"block2\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2017\/01\/Block2.png\" \/><\/p>\n<p>On the phishing page,\u00a0options are tailored to look like a legitimate email sign in page. For example, clicking the Office 365 option brings up a window that may look authentic to an untrained eye.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"1320\" height=\"873\" class=\"alignnone size-full wp-image-10575\" alt=\"pdf-example-2-screenshot-3\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2017\/01\/PDF-example-2-screenshot-3.png\" \/><\/p>\n<p>It\u2019s the same level of customization for the other options. For example, for the Google option, the window first asks you to choose whether you\u2019d like to sign in using your organizational or individual account. This step is not present in the actual Google sign in process, but this may be done to help the attackers identify business-related account credentials. It then brings up the sign in page.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"1329\" height=\"895\" class=\"alignnone size-full wp-image-10585\" alt=\"pdf-example-2-screenshot-4\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2017\/01\/PDF-example-2-screenshot-4.jpg\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"1329\" height=\"897\" class=\"alignnone size-full wp-image-10595\" alt=\"pdf-example-2-screenshot-5\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2017\/01\/PDF-example-2-screenshot-5.jpg\" \/><\/p>\n<p>If you enter your details, an actual PDF document (hosted in Google Drive, not Dropbox) is opened in a window.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"1313\" height=\"870\" class=\"alignnone size-full wp-image-10605\" alt=\"pdf-example-2-screenshot-6\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2017\/01\/PDF-example-2-screenshot-6.png\" \/><\/p>\n<p>As part of the social engineering tactic, this is done so you don\u2019t immediately suspect you were phished. By this time, the attackers will have your credentials. This last step can buy them more time to use your credentials before you realize you need to change your password.<\/p>\n<h2>Other examples: Enter your email credentials to access or download your file<\/h2>\n<p>We have seen other examples of PDF files being distributed via email and exhibiting the same characteristics. Just like the first two cases, these PDF files don\u2019t contain malicious code, apart from a link to a phishing site. All of them carry the message that you need to enter your email credentials so that you can view or download the document. All of these attachments are detected as variants of <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=PWS:HTML\/Misfhing.B\">Trojan:Win32\/Pdfphish<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"856\" height=\"720\" class=\"alignnone size-full wp-image-10615\" alt=\"pdf-example-3\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2017\/01\/PDF-example-3.png\" \/> <img loading=\"lazy\" decoding=\"async\" width=\"856\" height=\"701\" class=\"alignnone size-full wp-image-10625\" alt=\"pdf-example-4\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2017\/01\/PDF-example-4.png\" \/> <img loading=\"lazy\" decoding=\"async\" width=\"1012\" height=\"976\" class=\"alignnone size-full wp-image-10635\" alt=\"pdf-example-5\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2017\/01\/PDF-example-5.png\" \/> <img loading=\"lazy\" decoding=\"async\" width=\"1012\" height=\"976\" class=\"alignnone size-full wp-image-10645\" alt=\"pdf-example-6\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2017\/01\/PDF-example-6.png\" \/> <img loading=\"lazy\" decoding=\"async\" width=\"871\" height=\"427\" class=\"alignnone size-full wp-image-10665\" alt=\"pdf-example-8\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2017\/01\/PDF-example-8.jpg\" \/> <img loading=\"lazy\" decoding=\"async\" width=\"886\" height=\"410\" class=\"alignnone size-full wp-image-10655\" alt=\"pdf-example-7\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2017\/01\/PDF-example-7.png\" \/><\/p>\n<h2>How to stay safe from phishing attacks<\/h2>\n<p>As we saw from these examples, social engineering attacks are designed to take advantage of possible lapses in decision-making. Awareness is key; that is why we\u2019re making these cybercriminal tactics known.<\/p>\n<p>Don\u2019t open attachments or click links in suspicious emails. Even if the emails came from someone you know, if you are not expecting the email, be wary about opening the attachment, because spam and phishing emails may spoof the sender.<\/p>\n<p>In these times, when we\u2019re seeing heightened phishing attacks with improved social engineering techniques, a little bit of paranoia doesn\u2019t hurt. For instance, question why Adobe Reader is trying to open an Excel file. Ask why Dropbox is requiring you to enter your email credentials, not your Dropbox account credentials.<\/p>\n<p>For more information, download and read this Microsoft <a target=\"_blank\" href=\"https:\/\/info.microsoft.com\/Protectyourweakestlink.html?ls=social\">e-book on preventing social engineering attacks<\/a>, especially in enterprise environments.<\/p>\n<p>Using a secure platform like Windows 10 will let you take advantage of security features that can help identify and stop phishing attacks:<\/p>\n<ul>\n<li><a target=\"_blank\" href=\"https:\/\/technet.microsoft.com\/itpro\/microsoft-edge\/index\">Microsoft Edge<\/a> is a secure browser that can block phishing sites and other malicious websites using <a target=\"_blank\" href=\"https:\/\/blogs.windows.com\/msedgedev\/2015\/12\/16\/smartscreen-drive-by-improvements\/#3FYqD02TC1A6VsaL.97\">Microsoft SmartScreen<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/technet.microsoft.com\/en-us\/itpro\/windows\/keep-secure\/windows-defender-in-windows-10\">Windows Defender<\/a> can detect and block malicious PDF attachments and other malicious code<\/li>\n<li>Office 365 has built in content security features that can block spam and phishing emails<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em>Alden Pornasdoro<\/em><\/p>\n<p><em>MMPC<\/em><\/p>\n<p><a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2017\/01\/26\/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Gmail phishing attack\u00a0is reportedly so effective that it tricks even technical users, but it may be just the tip of the iceberg. We\u2019re seeing similarly simple but clever social engineering tactics using PDF attachments. These deceitful PDF attachments are being used in email phishing attacks that attempt to steal your email credentials. Apparently, the&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[10760,11105,3924,10510],"class_list":["post-6403","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-antimalware-research-for-it-pros-and-enthusiasts","tag-pdf-attachment","tag-phishing","tag-social-engineering"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6403","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6403"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6403\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6403"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6403"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6403"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}