SECURE&TIP: PDF CYBER ATTACKS

This entry is also available in:

 

 

What do these cyber-attacks consist of?

There are three types of cyber-attacks that can affect the integrity of PDF documents:

& Manipulation of a legitimate PDF by infecting it with malware (malicious software). This method mainly involves, on the one hand, camouflaging conditional viruses that are installed on the computer when downloading the file, or introducing QR codes or links in the text of the document, which redirect the user to a fake website, such as those discussed in previous TIPS (Phishing/Pharming).

& The creation of fake applications for scanning, reading, editing and signing PDF documents in order to obtain copies of confidential documents. In relation to these seemingly legitimate and harmless applications, users often do not carefully review the information about them before installing them. In fact, we usually download them for urgent or specific needs in order to access a PDF, and we will probably opt for the free version that is available.

& Subscription scams. Also associated with the downloading of applications to access a PDF, in this case the cybercriminal offers an apparently free program, but after some time of use it implies an automatic payment by subscription, without prior notice or consent from the user. In this case, an attempt is made to take advantage of users’ inattention by downloading applications for a single use and leaving them installed for months, without any use whatsoever. This illegal subscription service can only be detected by reviewing the transactions made in Apple-Store, Android-Store or any other similar platform where we download mobile applications.

How can we avoid this?

  • Try to use only official or well-known applications (Office, Adobe, DocHub, Signaturit, etc.) and review the usage information before downloading (company, terms and conditions, privacy policy, user reviews, etc.).
  • Check that the PDF is not infected with malware, by using an antivirus. Nowadays we can find protection programs that have this preventive scanning option. Not only on computers, but also for cell phones.
  • If you are redirected to a website, perform the checks indicated in previous TIPS. Check that it is the official website and, if in doubt, verify ownership by clicking on the padlock next to the website address.

IMPORTANT NOTE: If you believe you have been a victim of this type of cyberattack, report it in the work environment to the IT Dept, CISO or DPO and in the personal environment report it to the police authority.

*Date of shipment: April 14, 2025