Security firm EdgeSpot has been looking for PDF file exploits lately. Now, the firm's researchers have found two interesting ones.
This exploit is very similar to CVE-2013-3346, which was not obfuscated at that time of first discovery. Because of the obsfucation, it will bypass antivirus detection.
The obsfucation method that EdgeSpot researchers found could be used to hide other exploits besides this one.
After finding the first one, a second method of obsfucation was found a week later -- and it is potentially much more powerful.
The API references say that these two APIs, working together, are used to read the stream of an image named "icon" which stored in the PDF file.
The icon stream, which is simply named "icon," could be saved as a "jpg" file and viewed in image viewer without problem.
This led the researchers to conclude that the attacker likely copied a project/technique called "steganography.js", which is open sourced. The project was developed working on browsers.
EdgeSpot researchers also believe the person or persons behind the PDF samples made their innovation as they successfully leveraged the technique in PDF format. They could not find any information mentioning this technique in PDF exploits previously, so they think this is the first time that the "steganography" technique has been used to hide PDF exploits.
By using this technique, all streams look normal, all images are viewable, and everything looks legitimate. This can probably explain why almost all AV engines missed it.
Old exploits can be dressed up to hide themselves from detection. Security teams have to be aware that such mutation may occur, and adjust their own techniques accordingly.
- US Air Force: 5G Dominance Critical to National Security
- Security Leaders Need to Heed the Harsh Security Lessons of 2018
- Justice Department Ties 2 Chinese Nationals to Notorious APT10 Group
- US Ballistic Missile Defense System Riddled With Security Flaws
— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.