Major malware campaign abuses unfixed PDF flaw

Message poses as e-mail reset instructions, plants worm that can spread via flash drive

Several security companies today warned of a major malware campaign that tries to dupe users into opening rigged PDFs that exploit an unpatched design flaw in the format.

Users who open the attack PDFs are infected with a variant of a Windows worm known as "Auraax" or "Emold," researchers said.

The malicious messages masquerade as mail from company system administrators and come with the subject heading of "setting for your mailbox are changed," said Mary Grace Gabriel, a research engineer with CA Inc.'s security group . A PDF attachment purportedly contains instructions on how to reset e-mail settings. "SMTP and POP3 servers for ... mailbox are changed. Please carefully read the attached instructions before updating settings," the message states.

In reality, the PDFs contain embedded malware and use the format's /Launch function to execute that malware on Windows PCs running the newest versions of the free Adobe Reader, Adobe's for-a-fee Acrobat and other PDF viewers, such as Foxit Reader.

The /Launch feature is not a security vulnerability per se, but actually a by-design function of the PDF specification. Earlier this month, Belgium researcher Didier Stevens demonstrated how attack PDFs could use /Launch to run malware tucked into documents.

Two weeks ago, security researchers tracked a new run by the Zeus botnet that used the /Launch flaw to infect PCs.

Adobe has previously declined to answer questions on whether in-the-wild use of /Launch in rigged PDFs would prompt the company to update Reader and Acrobat, although it has said a change to the functionality might "conceivably [be made] available during one of the regularly scheduled quarterly product updates." Brad Arkin, Adobe's head of security and privacy, has acknowledged that one possible solution would be to disable the function; currently, it's turned on by default.

After analyzing the attack PDF, other researchers found that hackers are using Stevens' tactic of modifying the warning that Reader and Acrobat display. Adobe Reader, for example, displays a message telling users to open only those files they know are safe. In the same Windows dialog box, Reader displays the filename of the file about to be launched. According to IBM Internet Security Systems researchers , hackers have modified the warning to simply read, "Click the 'open' button to view this document."

Other security researchers, including those at Paris-based CERT-Lexsi , have also reported on the e-mail bearing rogue PDF attachments. CERT-Lexsi added that the malware's command-and-control server is located in Korea.

IBM researchers said the malware launched from the rigged PDF seems to be version of Auraax or Emold worm. The worm drops a rootkit onto the compromised PC, and also tries to copy itself to all removable drives, including flash drives, to spread using the "Autorun" infection tactic made popular by 2008's Conficker worm.

Staff at IDG -- which is the parent company of Computerworld -- have received the malicious messages with attached PDF documents. Those messages can pose as ones from "customersupport@ domain name .com," "support@ domain name .com," and "admin@ domain name .com," where domain name is typically the company's name.

An Adobe spokeswoman today declined to comment on the latest attacks, and said the company was still researching the /Launch functionality in Adobe Reader and Acrobat to identify "all possible use scenarios for this particular functionality to ensure we are not breaking any common workflows for our customers." Adobe's current advice remains that users configure Reader and Acrobat to stymie such attacks, she added. Adobe has posted instructions on its Web site.

IBM's security team also recommended that users disable Windows' Autorun feature for all flash drives, and pointed them toward a Microsoft support document for instructions and updates.

Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld . Follow Gregg on Twitter at @gkeizer or subscribe to Gregg's RSS feed . His e-mail address is gkeizer@ix.netcom.com .

Read more about malware and vulnerabilities in Computerworld's Malware and Vulnerabilities Knowledge Center.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection

Tags securitypdf bugmalware

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Gregg Keizer

Computerworld (US)
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Matthew Stivala

HP OfficeJet 250 Mobile Printer

The HP OfficeJet 250 Mobile Printer is a great device that fits perfectly into my fast paced and mobile lifestyle. My first impression of the printer itself was how incredibly compact and sleek the device was.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?