Increase in PDF malware up 7% in the last quarter, reports HP

HP Ireland issued its quarterly HP Wolf Security Threat Insights Report, showing attackers are continuing to find innovative ways to influence users and infect endpoints. The HP Wolf Security threat research team uncovered several notable campaigns including:

PDF Malware is on the rise: 11% of malware analysed in Q4 used PDFs to deliver malware, compared to just 4% in Q1 and Q2 2023. A notable example was a WikiLoader campaign using a fake parcel delivery PDF to trick users into installing Ursnif malware.
DarkGate campaign uses Ad tools to sharpen attacks: Malicious PDF attachments, posing as OneDrive error messages, direct users to sponsored content hosted on a popular ad network. This leads to DarkGate malware.

By using ad services, threat actors can analyse which lures generate clicks and infect the most users – helping them refine campaigns for maximum impact.
Threat actors can use CAPTCHA tools to prevent sandboxes from scanning malware and stopping attacks by ensuring only humans click.
DarkGate hands backdoor access to cybercriminals into networks, exposing victims to risks like data theft and ransomware.

A shift from Macros to Office exploits: In Q4, at least 84% of attempted intrusions involving spreadsheets, and 73% involving Word documents, sought to exploit vulnerabilities in Office applications – continuing the trend away from macro-enabled Office attacks. But macro-enabled attacks still have their place, particularly for attacks leveraging cheap commodity malware like Agent Tesla and XWorm.
Discord and TextBin being used to host malicious files: Threat actors are using legitimate file and text sharing websites to host malicious files. These sites are often trusted by organisations, helping the sites to avoid anti-malware scanners, increasing attackers’ chances of remaining undetected.

Val Gabriel, Managing Director at HP Ireland, comments: “Our latest report highlights how cybercriminals are becoming more and more agile in understanding how we work and the easiest ways to breach systems. For example, the design of popular cloud services is always being refined, so when a fake error message appears, it won’t necessarily raise an alarm, even if a user hasn’t seen it before. With GenAI generating even more convincing malicious content at little-to-no cost, distinguishing real from fake is expected to become more difficult.

“By isolating threats that have evaded detection tools on PCs – but still allowing malware to detonate safely – HP Wolf Security has specificinsight into the latest techniques used by cybercriminals in the fast-changing cybercrime landscape.”

To date, HP Wolf Security customers have clicked on over 40 billion email attachments, web pages, and downloaded files with no reportedbreaches.

The report details how cybercriminals continue to diversify attack methods to bypass security policies and detection tools. Other findings include:

Archives were the most popular malware delivery type for the seventh quarter running, used in 30% of malware analysed by HP.
At least 14% of email threats identified by HP Sure Click bypassed one or more email gateway scanners.
The top threat vectors in Q3 were email (75%), downloads from browsers (13%) and other means like USB drives (12%).

Dr. Ian Pratt, Global Head of Security for Personal Systems at HP Inc., comments:  “Cybercriminals are applying the same tools a business might use to manage a marketing campaign to optimise their malware campaigns, increasing the likelihood the user will take the bait. To protect against well-resourced threat actors, organisations must follow zero trust principles, isolating and containing risky activities like opening email attachments, clicking on links, and browser downloads.”

HP Wolf Security runs risky tasks in isolated, hardware-enforced virtual machines running on the endpoint to protect users, without impacting their productivity. It also captures detailed traces of attempted infections. HP’s application isolation technology mitigates threats that can slip past other security tools and provides unique insights into intrusion techniques and threat actor behavior.

See more stories here.