server must force the client (which opened the PDF
document) to authenticate itself. For this, we used the
Responder application by Spiderlabs (Gaffie, 2019).
The application starts a SMB server and waits for in-
coming connections. It tries to collect as much infor-
mation as possible from the incoming connection(s).
Figure 1 shows a Wireshark capture of an NTLM au-
thentication, which is used by Windows for an SMB
connection, and here forced by the responder, initially
triggered by a malicious PDF.
In our testing, GoToR, GoToE, ImportData,
Launch and Thread succeed to connect to such a
server. Some actions even did not alert or message the
client during or before their execution. Others alert a
user after execution that the requesting file was not
available or that there is a printing error. We believe
this confusing error to be caused by some applications
because some applications were not able to handle the
unexpected responses from the actions. Some appli-
cations recognized the outgoing connection and asked
for a user’s permission before they executed them.
Creating connections with JavaScript was not as
successful as solely actions, but it was also possible to
create some SMB and HTTP connections, especially
with browsers. Most of the applications also repli-
cate the privileged and non-privileged modes from the
Adobe JS API and ask users for their permission to
execute critical requests.
6 CONCLUSION
The original motivation for this paper was to investi-
gate whether today PDF processing applications are
already fully secured, or whether there are still ways
to misuse standard PDF format functions for ma-
licious goals. We enumerate in this paper candi-
date PDF functions, along with their potential mis-
use cases. Through the combination of triggers, ac-
tions and/or JavaScript code segments it is (still) pos-
sible to constructs malicious PDFs, although the re-
sults vary with every application. With the code ex-
amples it was possible to initiate connections to ex-
ternal destinations, execute code or change content
within the document. The success always depends on
the used PDF rendering engine and the completeness
of its PDF standard implementation and security mea-
sures.
We discovered no universal attack that is success-
ful for every application. As PDF applications are fast
moving targets, we expect the exploits to be already
patched in the most popular applications when you
read this, however we believe our summary presenta-
tion here is a good basis for future work in this area.
ACKNOWLEDGEMENTS
The financial support by the Christian Doppler Re-
search Association, the Austrian Federal Ministry for
Digital and Economic Affairs and the National Foun-
dation for Research, Technology and Development is
gratefully acknowledged.
The work presented in this paper was done at the
Josef Ressel Center for Unified Threat Intelligence on
Targeted Attacks (TARGET), at St. P
¨
olten University
of Applied Sciences, Austria.
REFERENCES
Adobe (2007). JavaScript for Acrobat API Ref-
erence; Adobe Acrobat SDK Version 8.1.
https://www.adobe.com/content/dam/acom/en/devnet/
acrobat/pdfs/js api reference.pdf.
Adobe (2008). ISO 32000-1; Portable document format –
Part 1: PDF 1.7. https://www.pdfa.org/resource/iso-
32000-1-pdf-1-7/.
Gaffie, L. (2019). Responder, a LLMNR/NBT-NS/mDNS
poisoner. https://github.com/lgandx/Responder.
Google (2019). Pdfium: a PDF rendering engine.
https://opensource.google.com/projects/pdfium.
Lu, X., Zhuge, J., Wang, R., Cao, Y., and Chen, Y. (2013).
De-obfuscation and detection of malicious pdf files
with high accuracy. In System sciences (HICSS), 2013
46th Hawaii international conference on, pages 4890–
4899. IEEE.
Maiorca, D. and Biggio, B. (2019). Digital investigation
of pdf files: Unveiling traces of embedded malware.
IEEE Security and Privacy: Special Issue on Digital
Forensics, 17:63–71.
Maiorca, D., Corona, I., and Giacinto, G. (2013). Looking
at the bag is not enough to find the bomb: an evasion
of structural methods for malicious pdf files detection.
In Proceedings of the 8th ACM SIGSAC symposium on
Information, computer and communications security,
pages 119–130. ACM.
O’Donnell, L. (2019). Phishing campaign deliv-
ers nasty ransomware, credential-theft two-
punch. https://threatpost.com/phishing-gandcrab-
ursnif/141182/.
PDF Association (2017). ISO 32000-2; PDF 2.0 specifica-
tion. https://www.pdfa.org/resource/iso-32000-2-pdf-
2-0/.
Raynal, F., Delugr
´
e, G., and Aumaitre, D. (2010). Mali-
cious origami in pdf. Journal in computer virology,
6(4):289–315.
Stevens, D. (2011). Malicious pdf documents explained.
IEEE Security Privacy, 9(1):80–82.
Ulucenk, C., Varadharajan, V., Balakrishnan, V., and Tu-
pakula, U. (2011). Techniques for analysing pdf mal-
ware. In Software Engineering Conference (APSEC),
2011 18th Asia Pacific, pages 41–48. IEEE.
Zurkus, K. (2019). Document-Based Malware on
the Rise in 2019. https://www.infosecurity-
magazine.com:443/news/document-based-malware-
on-rise-2019/.
ICISSP 2020 - 6th International Conference on Information Systems Security and Privacy
584