Get a Pentest and security assessment of your IT network.

Cyber Security

Shadow Attacks Let Attackers Replace Content in Digitally Signed PDFs

Researchers from Ruhr-University Bochum have demonstrated a novel class of attacks that could allow a bad actor to break the integrity protection of digitally signed PDF documents. The attacks leverage “harmless” PDF features which do not invalidate the signature, such as “incremental update” and “interactive forms” to hide the malicious content behind seemingly innocuous overlay objects. A third variant called “hide and replace” can be used to combine the aforementioned methods and modify the contents of an entire document by simply changing the object references in the PDF.

Source: https://thehackernews.com/2021/02/shadow-attacks-let-attackers-replace.html

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security