DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Archive

How the New PDFex Attack can Exfiltrate Data from Encrypted PDF Files

DigitalCIO Bureau by DigitalCIO Bureau
October 1, 2019
in Archive
0
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Dubbed as ‘PDFex’, this new cyber attack can exfiltrate data from encrypted PDF files. Read on to know more about it…

Researchers have detailed a new attack that can exfiltrate data from encrypted Portable Document Format (PDF) files. The new PDFex attack can exfiltrate data from encrypted PDF files.

The attack doesn’t target the encryption applied to a PDF document by external software, but the encryption schemes supported by the Portable Document Format (PDF) standard, itself. The PDF standard supports native encryption so that PDF apps can encrypt files that can be opened by any other app, and prevent user lock-in for one specific PDF software due to the use of shady encryption schemes.

Investigation
The researchers tested the PDFex attack techniques against 27 widely used PDF viewers including Adobe Acrobat, Foxit Reader, Evince, Nitro, and Chrome and Firefox’s built-in PDF viewers, and found all of them to be vulnerable. The researchers found that an attacker can manipulate an encrypted PDF file, even without knowing the corresponding password.

Variants
Dubbed ‘PDFex’, the attack comes in two technique variants. The two variants of PDFex attack include Direct Exfiltration and CBC Gadgets.

Data Exfiltration: This technique takes advantage of the fact that PDF apps don’t encrypt the entirety of a PDF file, leaving some parts unencrypted. Thus, an attacker can modify the unencrypted field, add unencrypted objects, or wrap encrypted parts into a context controlled by the attacker. This can be done via PDF forms, or hyperlinks, or Javascript codes.

CBC Gadgets: In this technique, attackers use CBC gadgets to exfiltrate plaintext. PDF encryption generally defines no authenticated encryption, therefore, attackers can modify the plaintext data directly within an encrypted object, for example, by prefixing it with an URL.

“This attack has two necessary preconditions:

• Known plaintext: To manipulate an encrypted object using CBC gadgets, a known plaintext segment is necessary. For AESV3 – the most recent encryption algorithm – this plain- text is always given by the Perms entry. For older versions, known plaintext from the object to be exfiltrated is necessary.

• Exfiltration channel: One of the interactive features: PDF Forms or Hyperlinks,” researchers explained.

Working Mechanism
To be noted, the PDFex attacks don’t allow an attacker to know or remove the password for an encrypted PDF; instead, enable attackers to remotely exfiltrate content once a legitimate user opens that document. In other words, PDFex allows attackers to modify a protected PDF document, without having the corresponding password, in a way that when opened by someone with the right password, the file will automatically send out a copy of the decrypted content to a remote attacker-controlled server on the Internet.

PDF encryption uses the Cipher Block Chaining (CBC) encryption mode with no integrity checks, this allows anyone to create self-exfiltrating ciphertext parts using CBC malleability gadgets. Most of the data formats allow us to encrypt only parts of the content. This encryption flexibility allows an attacker to include their own content, which can lead to exfiltration channels.

“More precisely, the PDF specification allows the mixing of ciphertexts with plaintexts. In combination with further PDF features which allow the loading of external resources via HTTP, the attacker can run direct exfiltration attacks once a victim opens the file,” researchers described in a blog.

Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Gartner: Global AI Spending Will Total $1.5 Trillion In 2025

by DigitalCIO Bureau
September 17, 2025
0

Worldwide spending on AI is forecast to total nearly $1.5 trillion in 2025 according to research firm Gartner. "The forecast assumes continued investment in AI infrastructure expansion, as...

Read moreDetails

Qlik Launches ‘Qlik Answers’ to Accelerate AI Implementation

by DigitalCIO Bureau
September 1, 2025
0
Qlik Launches ‘Qlik Answers’ to Accelerate AI Implementation

Qlik has announced growing enterprise adoption of Qlik Answers, as companies across sectors move beyond AI prototypes and into business-critical deployment. Built for real-world complexity, Qlik Answers allows organizations to extract intelligence...

Read moreDetails

Google’s AI bug finder has found 20 vulnerabilities

by DigitalCIO Bureau
August 6, 2025
0
Kaspersky Unveils Guidelines For Secure AI Deployment At IGF 2024

Google has found and reported twenty vulnerabilities in various popular open-source projects through an AI-powered bug finder. The "researcher," dubbed Big Sleep, was introduced in November last year....

Read moreDetails

Qlik Cloud Analytics available through AWS Marketplace

by DigitalCIO Bureau
July 21, 2025
0
Qlik Cloud Analytics available through AWS Marketplace

Qlik has announced the availability of Qlik Cloud Analytics in the new AI Agents and Tools category of AWS Marketplace. Customers can now use AWS Marketplace to easily...

Read moreDetails

KnowBe4 Releases AI-Driven Prevent To Tackle Outbound Email Risk

by DigitalCIO Bureau
July 19, 2025
0
Barracuda Networks Updates Email Security Suite

KnowBe4 has announced the release of KnowBe4 Prevent across all market segments – an AI-driven email security product designed to enable organizations to manage the problem of outbound...

Read moreDetails
Next Post

New Google Internet protocol under anti-trust probe: Report

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Why Big Data and Cloud Computing is a Perfect Combination

January 22, 2020
Tenable to Acquire Vulcan Cyber For $150M

Tenable to Acquire Vulcan Cyber For $150M

January 30, 2025

Efforts being made to nab frauds creating fake accounts to siphon off donation money for COVID-19

March 31, 2020

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud HCLTech Honeywell IBM Infographics Internet of Things (IoT) Kaspersky Microsoft Netskope NTT DATA Palo Alto Networks Panel Discussion Qlik Salesforce Sophos Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?