{"id":87249,"date":"2018-12-25T14:43:28","date_gmt":"2018-12-25T09:13:28","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=87249"},"modified":"2023-09-25T17:54:33","modified_gmt":"2023-09-25T12:24:33","slug":"beware-pdf-attachments-launching-android-malware","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/beware-pdf-attachments-launching-android-malware\/","title":{"rendered":"Beware!! PDF Attachments Launching Android malware"},"content":{"rendered":"<p><span style=\"font-family: Calibri, sans-serif;\"><span style=\"font-size: medium;\"><span lang=\"en-US\">As a normal user we receive multiple <\/span><\/span><\/span><span style=\"font-family: Calibri, sans-serif;\"><span style=\"font-size: medium;\"><span lang=\"en-US\">emails <\/span><\/span><\/span><span style=\"font-family: Calibri, serif;\">on a daily basis <\/span><span style=\"font-family: Calibri, sans-serif;\"><span style=\"font-size: medium;\"><span lang=\"en-US\">with <\/span><\/span><\/span><span style=\"font-family: Calibri, sans-serif;\"><span style=\"font-size: medium;\"><span lang=\"en-US\">PDF<\/span><\/span><\/span><span style=\"font-family: Calibri, sans-serif;\"><span style=\"font-size: medium;\"><span lang=\"en-US\"> as an attachment. Recently, at Quick-Heal <\/span><\/span><\/span><span style=\"font-family: Calibri, serif;\">Security<\/span><span style=\"font-family: Calibri, sans-serif;\"><span style=\"font-size: medium;\"><span lang=\"en-US\"> Lab, we observed a malicious PDF file sent to users as an attachment <\/span><\/span><\/span><span style=\"font-family: Calibri, serif;\">via a phishing mail<\/span><span style=\"font-family: Calibri, sans-serif;\"><span style=\"font-size: medium;\"><span lang=\"en-US\">. <\/span><\/span><\/span><span style=\"font-family: Calibri, serif;\">These PDF files look like a regular document but that\u2019s not the truth.<\/span><span style=\"font-family: Calibri, sans-serif;\"><span style=\"font-size: medium;\"><span lang=\"en-US\"> It looks locked out and blurred to misguide and make the user curious to open it. These kinds of malicious documents are designed to lure the user <\/span><\/span><\/span><span style=\"font-family: Calibri, serif;\">into opening such documents<\/span><span style=\"font-family: Calibri, sans-serif;\"><span style=\"font-size: medium;\"><span lang=\"en-US\">. This is <\/span><\/span><\/span><span style=\"font-family: Calibri, sans-serif;\"><span style=\"font-size: medium;\"><span lang=\"en-US\">a <\/span><\/span><\/span><span style=\"font-family: Calibri, sans-serif;\"><span style=\"font-size: medium;\"><span lang=\"en-US\">key entry point for the malware to the device. <\/span><\/span><\/span><\/p>\n<p><span style=\"font-family: Calibri, sans-serif;\"><span style=\"font-size: medium;\"><span lang=\"en-US\">These types of PDF<\/span><\/span><span style=\"font-size: medium;\"><span lang=\"en-US\">s<\/span><\/span><span style=\"font-size: medium;\"><span lang=\"en-US\"> try to get attention of <\/span><\/span><span style=\"font-size: medium;\"><span lang=\"en-US\">the <\/span><\/span><span style=\"font-size: medium;\"><span lang=\"en-US\">user to click on it by using various ways like \u201c<strong><em>To open this document, update the adobe reader<\/em><\/strong>\u201d or \u201c<strong><em>To unlock this document press below button<\/em><\/strong>\u201d. W<\/span><\/span><span style=\"font-size: medium;\"><span lang=\"en-US\">hen <\/span><\/span><span style=\"font-size: medium;\"><span lang=\"en-US\">the <\/span><\/span><span style=\"font-size: medium;\"><span lang=\"en-US\">user perform click<\/span><\/span><span style=\"font-size: medium;\"><span lang=\"en-US\"> action on that document, then <\/span><\/span><span style=\"font-size: medium;\"><span lang=\"en-US\">it<\/span><\/span><span style=\"font-size: medium;\"><span lang=\"en-US\"> downloads malicious APK <\/span><\/span><span style=\"font-size: medium;\"><span lang=\"en-US\">(Android executable)<\/span><\/span><span style=\"font-size: medium;\"><span lang=\"en-US\"> file from <\/span><\/span><span style=\"font-size: medium;\"><span lang=\"en-US\">a <\/span><\/span><span style=\"font-size: medium;\"><span lang=\"en-US\">malicious link present in that PDF<\/span><\/span><span style=\"font-size: medium;\"><span lang=\"en-US\">, which will further download original Adobe <\/span><\/span><span style=\"font-size: medium;\"><span lang=\"en-US\">reader<\/span><\/span><span style=\"font-size: medium;\"><span lang=\"en-US\">. <\/span><\/span><\/span><\/p>\n<p><strong><span style=\"font-family: Calibri, sans-serif;\"><span style=\"font-size: medium;\"><span lang=\"en-US\">After analyzing one such PDF file, w<\/span><\/span><span style=\"font-size: medium;\"><span lang=\"en-US\">e found hyperlinks added in PDF, <\/span><\/span><span style=\"font-size: medium;\"><span lang=\"en-US\">the code<\/span><\/span><span style=\"font-size: medium;\"><span lang=\"en-US\"> shown <\/span><\/span><span style=\"font-size: medium;\"><span lang=\"en-US\">below &#8211;<\/span><\/span><\/span><\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-87250 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/12\/pdf.png\" alt=\"\" width=\"554\" height=\"275\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/pdf.png 554w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/pdf-300x149.png 300w\" sizes=\"(max-width: 554px) 100vw, 554px\" \/><\/p>\n<p><span style=\"color: #000000;\"><span style=\"font-family: Calibri, sans-serif;\"><span style=\"font-size: medium;\">Actually, above links are associated with malicious APK, which is downloaded on user\u2019s device, currently URLs are not active.<\/span><\/span><\/span><\/p>\n<p><span style=\"color: #000000;\"><span style=\"font-family: Calibri, serif;\"><strong>Below image shows the flow of this malicious activity &#8211;<\/strong> <\/span><\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-87251 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/12\/flow.png\" alt=\"\" width=\"548\" height=\"134\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/flow.png 548w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/flow-300x73.png 300w\" sizes=\"(max-width: 548px) 100vw, 548px\" \/><\/p>\n<p><strong><span style=\"color: #000000;\"><span style=\"font-family: Calibri, serif;\">Analysis of downloaded malicious APK &#8211;<br \/>\n<\/span><\/span><\/strong><\/p>\n<p><span style=\"font-family: Calibri, serif;\">It displays the below icon which is different from genuine Adobe reader as shown below &#8211;<br \/>\n<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-87252 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/12\/icon-1.png\" alt=\"\" width=\"113\" height=\"106\" \/><\/p>\n<p><span style=\"font-family: Calibri, serif;\"><strong>This application uses many sensitive permissions like &#8211;<\/strong><br \/>\n<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-87253 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/12\/permissions.png\" alt=\"\" width=\"543\" height=\"340\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/permissions.png 543w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/permissions-300x188.png 300w\" sizes=\"(max-width: 543px) 100vw, 543px\" \/><\/p>\n<p><span style=\"font-family: Calibri, serif;\">These important permissions like reading contacts, SMS, call logs contradict with functionality of Adobe.<\/span><\/p>\n<p><span style=\"font-family: Calibri, serif;\">When user opens this application, it shows Adobe Acrobat installation screen. Actually, this malware carries original Adobe Acrobat APK with it and shows its installation screen to user. User gets an impression that he\/she is downloading the Adobe Reader\u2019s updates and<\/span><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: medium;\"> innocently clicks on &#8220;<strong><em>install updates<\/em><\/strong>&#8221; button.<\/span><\/span><span style=\"font-family: Calibri, serif;\"> After that malware hides its icon and start its malicious service in the background.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-87254 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/12\/screens.png\" alt=\"\" width=\"594\" height=\"299\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/screens.png 594w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/screens-300x151.png 300w\" sizes=\"(max-width: 594px) 100vw, 594px\" \/><\/p>\n<p><strong><span style=\"font-family: Calibri, serif;\">If we check running applications then it shows both applications are in running state &#8211;<\/span><\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-87255 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/12\/running.png\" alt=\"\" width=\"273\" height=\"272\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/running.png 273w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/running-150x150.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/running-70x70.png 70w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/running-80x81.png 80w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/running-45x45.png 45w\" sizes=\"(max-width: 273px) 100vw, 273px\" \/><\/p>\n<p><strong><span style=\"font-family: Calibri, serif;\">It contains the below code to install original Adobe Acrobat reader from resources-<\/span><\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-87256 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/12\/code1.png\" alt=\"\" width=\"639\" height=\"178\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/code1.png 639w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/code1-300x84.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/code1-304x84.png 304w\" sizes=\"(max-width: 639px) 100vw, 639px\" \/><\/p>\n<p><span style=\"font-family: Calibri, serif;\">Here <\/span><em><span style=\"font-family: Calibri, serif;\"><b>base.apk<\/b><\/span><\/em><span style=\"font-family: Calibri, serif;\"> is nothing but original Adobe reader APK file.<\/span><\/p>\n<p><strong><span style=\"font-family: Calibri, serif;\">Here, if phone is rooted then it executes below code &#8211;<\/span><\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-87257 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/12\/code2.png\" alt=\"\" width=\"518\" height=\"137\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/code2.png 518w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/code2-300x79.png 300w\" sizes=\"(max-width: 518px) 100vw, 518px\" \/><\/p>\n<p><strong><span style=\"font-family: Calibri, serif;\">And for non-rooted phone it executes below code &#8211;<\/span><\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-87258 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/12\/code3.png\" alt=\"\" width=\"639\" height=\"94\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/code3.png 639w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/code3-300x44.png 300w\" sizes=\"(max-width: 639px) 100vw, 639px\" \/><\/p>\n<p><span style=\"font-family: Calibri, serif;\">This malware is nothing but spyware and spies on almost every activity on the user\u2019s phone. For this purpose it registers many intents like \u201c<em><strong>R<\/strong><strong>eceive SMS<\/strong><\/em>\u201d, \u201c<em><strong>O<\/strong><strong>utgoing call<\/strong><\/em>\u201d, \u201c<em><strong>A<\/strong><strong>pplication install<\/strong><\/em>\u201d etc. to get notification about device state like <strong><em>new call<\/em><\/strong> or <em><strong>SMS<\/strong> <strong>received<\/strong><\/em> on user\u2019s phone.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-87259 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/12\/code4.png\" alt=\"\" width=\"492\" height=\"114\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/code4.png 492w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/code4-300x70.png 300w\" sizes=\"(max-width: 492px) 100vw, 492px\" \/><\/p>\n<p><span style=\"font-family: Calibri, serif;\">When new SMS notification is received on the phone, then it collects the SMS number and sends it to server.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-87260 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/12\/code5.png\" alt=\"\" width=\"641\" height=\"250\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/code5.png 641w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/code5-300x117.png 300w\" sizes=\"(max-width: 641px) 100vw, 641px\" \/><\/p>\n<p><span style=\"font-family: Calibri, serif;\">It also collects location-related data i.e. longitude and latitude.<br \/>\n<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-87261 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/12\/code6.png\" alt=\"\" width=\"641\" height=\"63\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/code6.png 641w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/code6-300x29.png 300w\" sizes=\"(max-width: 641px) 100vw, 641px\" \/><\/p>\n<p><span style=\"font-family: Calibri, serif;\">When a new \u201c<strong><em>Call starts<\/em><\/strong>\u201d or \u201c<strong><em>M<\/em><em>issed call received<\/em><\/strong>\u201d it collects that number and sends it to the server.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-87263 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/12\/code77.png\" alt=\"\" width=\"365\" height=\"527\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/code77.png 365w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/code77-208x300.png 208w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/code77-270x390.png 270w\" sizes=\"(max-width: 365px) 100vw, 365px\" \/><\/p>\n<p><span style=\"font-family: Calibri, serif;\">Apart from this, it also has the capability to<em> read contacts, read browser bookmarks, key-logging, and kill background processes.<\/em><\/span><\/p>\n<p><strong><span style=\"font-family: Calibri, serif;\">Quick-Heal detection &#8211;<\/span><\/strong><\/p>\n<p><em><span style=\"font-family: Calibri, serif;\">PDF file is detected by name &#8211; <\/span><\/em><em><span style=\"font-family: Calibri, serif;\"><b>Trojan. PDF.Agent.33376<\/b><\/span><\/em><\/p>\n<p><em><span style=\"font-family: Calibri, serif;\">Dropped APK file is detected by name &#8211; <\/span><\/em><em><span style=\"font-family: Calibri, serif;\"><b>Android.Spy.GEN27587<\/b><\/span><\/em><\/p>\n<p><strong><span style=\"font-family: Calibri, serif;\">Conclusion-<\/span><\/strong><\/p>\n<p><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: medium;\">Threat actors continuously try to find a new way to enter a user\u2019s device. <\/span><\/span><span style=\"font-family: Calibri, serif;\">So, the most important requirement is to install a strong and comprehensive security solution that can protect both the data stored on devices and the information accessed on them. <\/span><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: medium;\">Clicking on unknown\/suspicious links should also be avoided.<\/span><\/span><\/p>\n<p><strong><span style=\"font-family: Calibri, serif;\">Tips to stay safe from Android malware-<\/span><\/strong><\/p>\n<ul>\n<li><span style=\"font-family: Calibri, serif;\">Avoid downloading apps from third-party app stores or links provided in SMSs or emails.<\/span><\/li>\n<li><span style=\"font-family: Calibri, serif;\">Avoid opening <\/span><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: medium;\">emails and <\/span><\/span><span style=\"font-family: Calibri, serif;\">attachments from unknown sources.<\/span><\/li>\n<li><span style=\"font-family: Calibri, serif;\">Always keep \u2018Unknown Sources\u2019 disabled. Enabling this option allows the installation of <\/span><span style=\"font-family: Calibri, serif;\">apps from unknown sources.<\/span><\/li>\n<li><span style=\"font-family: Calibri, serif;\">Most importantly, verify app permissions before installing any app even from official <\/span><span style=\"font-family: Calibri, serif;\">stores such as Google Play.<\/span><\/li>\n<li>I<span style=\"font-family: Calibri, serif;\">nstall a reliable <a href=\"https:\/\/bit.ly\/2isL3JA\">mobile<\/a> <a href=\"https:\/\/bit.ly\/2isL3JA\">security<\/a> app that can detect and block fake and malicious apps before <\/span><span style=\"font-family: Calibri, serif;\">they can infect your device.<\/span><\/li>\n<li><span style=\"font-family: Calibri, serif;\">Always keep your device OS and mobile security app up-to-date.<\/span><\/li>\n<li><span style=\"font-family: Calibri, serif;\">Check the app developer\u2019s name, app\u2019s description, and developer\u2019s website.<\/span><\/li>\n<li><span style=\"font-family: Calibri, serif;\">If the name sounds strange or odd, you have reasons to suspect it.<\/span><\/li>\n<li><span style=\"font-family: Calibri, serif;\">Go through the reviews and ratings of the app. But, note that these can be fake too.<\/span><\/li>\n<li><span style=\"font-family: Calibri, serif;\">Limit yourself to known apps from known developers and keep only those apps on mobile that <\/span><span style=\"font-family: Calibri, serif;\">are really needed.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-family: Calibri, sans-serif;\"><strong><b>Subject Matter Experts:<\/b><br \/>\n<\/strong><\/span><\/p>\n<p><span style=\"font-family: Calibri, sans-serif;\">Prachi Sudame, Prakash Galande | Quick Heal Security Labs<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As a normal user we receive multiple emails on a daily basis with PDF as an attachment. Recently, at Quick-Heal Security Lab, we observed a malicious PDF file sent to users as an attachment via a phishing mail. These PDF files look like a regular document but that\u2019s not the truth. It looks locked out [&hellip;]<\/p>\n","protected":false},"author":55,"featured_media":87248,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[70,55,24,354],"tags":[],"class_list":["post-87249","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-adobe","category-android","category-malware","category-mobile-security-2"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/87249"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/55"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=87249"}],"version-history":[{"count":11,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/87249\/revisions"}],"predecessor-version":[{"id":92096,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/87249\/revisions\/92096"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/87248"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=87249"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=87249"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=87249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}