PDFSider the threat hidden in signed software to open doors to the ransomware

Published 5 min de lectura 220 reading

In recent weeks, security researchers have had a campaign that combines classic social engineering techniques with an increasingly sophisticated code: a new backdoor named as PDFSider is being used to open silent doors in Windows environments and to facilitate ransomware deployments against high-profile companies, including at least one target within the Fortune 100 list of the financial sector.

The point of entry is not a cero-day starring explosion, but a calculated mix of lures and abuse of trust. The attackers send directed e-mails containing a ZIP file. Within this ZIP comes a legitimate and digitally signed copy of the PDF24 Creator installer, a known application whose official website is pdf24.org. Next to that legitimate executable place a manipulated DLL bookstore called cryptbase.dll; when .EXE loads malicious DLL, the attacker code is executed within the legitimate process. This technique, known as DLL side-rolling, takes advantage of the confidence that the system and the security solutions give to signed binaries.

PDFSider the threat hidden in signed software to open doors to the ransomware
Image generated with IA.

The technical details of the malware were published by the firm that discovered it during an incident response. Resecurity describes PDFSider as a backdoor designed to remain hidden and maintain persistent access, with features that remember more to the directed cyberespionage that to malware purely oriented to get a quick rescue.

In addition to the installer's decoy, in some variants the emails carry decoy documents that seem to be made to the victim's measure: PDFs with false authors who pretended to belong to government entities to give credibility and increase the likelihood that the recipient will execute the attachment. In other operations, the attackers resorted to social engineering by calling, posing as technical support personnel and trying to convince employees to install remote tools such as Microsoft's assistance utility - a maneuver that facilitates interactive system control with the victim's direct consent.

When the malicious DLL is loaded, inherit the permissions of the legitimate executable who called it, which can allow attackers to skip controls and fuel side movements on the internal network. PDFSider also avoids leaving track on disk by loading much of its code directly into memory and uses anonymous tubes to run commands by CMD, techniques that make it difficult to detect by EDR and other mechanisms based on file analysis.

Communication with the command and control infrastructure is also designed to camouflage: infected teams receive a unique identifier, collect system information and transmit it to the attacker's server using DNS requests by port 53, a channel that often goes unnoticed on many networks. To protect the confidentiality and integrity of these sessions, PDFSider uses the Botan cryptographic bookstore in its version 3.0.0 and AEAD encryption with AES-256-GCM, deciphering data in memory to minimize persistent artifacts in the host. The general documentation of Botan is available at botan.randombit.net.

The use of AES-GCM and a mature bookstore like Botan is significant: it is not the improvisation of a kiddie script, but an implementation aimed at keeping communications safe and resistant to analysis. Further, malware incorporates anti-analysis measures such as RAM size checks and debugging detection to abort its execution if it appears to be running inside a sandbox or in a research environment.

Resecurity points out that PDFSider has been observed in attacks linked to Qilin Ransomware, although its threat search team has seen the backdoor being reused by different actors with economic motives. This flexibility is dangerous: a component designed to remain hidden and provide remote control can be used by both espionage groups and by ransomware bands that want to maintain prior access to the deployment of encryption.

The weapon in this campaign is not an exotic vulnerability, but the use of legitimate and signed software that you would load in an expected way. That kind of abuse is known and documented within the framework of attacker techniques: the MITRE ATT & CK base collects and classifies load variants from DLL as techniques that allow code execution by reliable binaries; your specification can be found at MITRE ATT & CK - DLL Side-Loading.

What practical lessons does this incident leave? First, that the confidence in the digital signature of an executable is not by itself a security guarantee: valid signatures can be used as Trojan horse if the binary loads manipulative local bookstores. Secondly, effective campaigns combine social engineering with techniques to evade detection, so protection must be both technological and human. Thirdly, defenders must pay attention to seemingly benign channels such as DNS and processes that, although legitimate, show unusual behaviour when performing external components.

PDFSider the threat hidden in signed software to open doors to the ransomware
Image generated with IA.

In the field of operation, it is appropriate to review software execution policies and DLL search routes on critical stations and servers, tighten privilege management and apply controls that restrict the installation of remote tools without authorization. It is also important to have detection of DNS traffic anomalies and memory telemetry and processes, as well as a response plan that includes the identification and containment of back doors acting in memory.

For organizations looking for references and action frameworks, the collective guides on ransomware and response to government incidents and cybersecurity agencies offer useful guidelines, for example, the US initiative to stop ransomware collects recommendations and cases of use in CISA - Stop Ransomware. And for those who want to deepen the technical report on PDFSider, the Resecurity note contains a detailed technical analysis that is worth reviewing: Resecurity Report on PDFSider.

In short, PDFSider is a reminder that attackers combine social engineering, abuse of confidence and good technical practices to create threats that are difficult to detect. Protecting itself requires a comprehensive strategy that not only deploys security tools, but also educates people, controls the software's execution surface and monitors communication channels that are traditionally considered harmless.

Coverage

Related

More news on the same subject.