Get a Pentest and security assessment of your IT network.

Cyber Security

Inside a Malicious PDF Attack

Hackers are intelligent about wrapping Executable files in shellcode, encrypting it and hiding it in Javascript within PDF files. Using a number of utilities, we are able to reverse engineer the techniques in malicious PDFs. In this infected PDF, the shellcode uses it to point the PC to an infection point, which is the IP address we have circled. Once the infected file is downloaded, the. shellcode will execute it, infecting the computer. Like Inception, you have to go deeper to find what is truly at the heart of this infected.

Source: https://threatpost.com/inside-malicious-pdf-attack-052311/75262/

Related posts
Cyber Security

Zip Codes & PII: Are They Personal Data?

Cyber Security

Zero-Day Vulnerabilities: User Defence Guide

Cyber Security

Zero Knowledge Voting with Trusted Server

Cyber Security

ZeroNet: 51% Attack Risks & Mitigation