{"id":1084,"date":"2021-04-14T14:21:12","date_gmt":"2021-04-14T21:21:12","guid":{"rendered":"https:\/\/commons.royalroads.ca\/studentlife\/?p=1084"},"modified":"2021-04-14T14:21:12","modified_gmt":"2021-04-14T21:21:12","slug":"phishing-attacks-using-pdf-files","status":"publish","type":"post","link":"https:\/\/commons.royalroads.ca\/studentlife\/phishing-attacks-using-pdf-files\/","title":{"rendered":"Phishing Attacks Using PDF Files"},"content":{"rendered":"<h3>[HEADS UP] Recent Phishing Attacks Using PDF Files Have Skyrocketed More Than 1,000%<\/h3>\n<p>Here are two new recent trends in phishing attacks involving file attachments. \u00a0If you ever have any questions about files that you receive through email, please ask me or contact the help desk before downloading or opening them.<\/p>\n<p>Phishing attacks using PDF files have spiked over the past year, according to researchers at Palo Alto Networks\u2019 Unit 42.<\/p>\n<p>\u201cFrom 2019-20, we noticed a dramatic 1,160% increase in malicious PDF files \u2013 from 411,800 malicious files to 5,224,056,\u201d the researchers write. \u201cPDF files are an enticing phishing vector as they are cross-platform and allow attackers to engage with users, making their schemes more believable as opposed to a text-based email with just a plain link.\u201d<\/p>\n<p>The most common form of PDF phishing lures used an image of a fake CAPTCHA to trick victims into clicking the \u201cContinue\u201d button, which led to a malicious site. Another variant used an image that purported to be a coupon and told victims to click the image in order to get 50% off on a product.<\/p>\n<p>The third type of PDF phishing attack used images that appeared to be paused videos but led to a phishing site when users clicked on them.<\/p>\n<p>\u201cThese phishing files do not necessarily carry a specific message, as they are mostly static images with a picture of a play button ingrained in them,\u201d Unit 42 says. \u201cAlthough we observed several categories of images, a significant portion of them either used nudity or followed specific monetary themes such as Bitcoin, stock charts and the like to lure users into clicking the play button.\u201d<\/p>\n<p><u>RRU is noticing this trend<\/u>.\u00a0 We had several instances of identity theft at the start of the pandemic last year that started with a malicious link in a PDF file and, more recently, a malicious link in a PDF file was responsible for a staff member\u2019s account being compromised back in December.<\/p>\n<p>&nbsp;<\/p>\n<h3>New Phishing Attack With .TXT Attachment<\/h3>\n<p>It had to happen\u2026 we\u2019re now starting to see reports of the lowly .txt (text) file being used as a way to get malicious software onto your computer.\u00a0 Here\u2019s what they\u2019re doing.<\/p>\n<p>&nbsp;<\/p>\n<p>Initially, you\u2019ll see an email message with an attachment with a name similar to \u201cReadMe_knl.txt.\u201d\u00a0 It may even have a Notepad icon associated with it, and it will open like a text file. \u00a0However, it will actually execute some code prepared by the attacker and download a malicious script from the Internet onto the computer. \u00a0After the script gets onto your computer, it can do a number of different things depending on what the particular attacker has set it up to do.<\/p>\n<p>Bottom line: <strong>PLEASE<\/strong> be extra careful of <strong>EVERY<\/strong> file attached to an email, even the simple .txt file.\u00a0 Even they\u2019re not safe anymore.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[HEADS UP] Recent Phishing Attacks Using PDF Files Have Skyrocketed More Than 1,000% Here are two new recent trends in phishing attacks involving file attachments. \u00a0If you ever have any questions about files that you receive through email, please ask&#8230; <a class=\"more-link\" href=\"https:\/\/commons.royalroads.ca\/studentlife\/phishing-attacks-using-pdf-files\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":358,"featured_media":1086,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[11,6],"tags":[],"class_list":["post-1084","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-notices","category-resources"],"_links":{"self":[{"href":"https:\/\/commons.royalroads.ca\/studentlife\/wp-json\/wp\/v2\/posts\/1084","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/commons.royalroads.ca\/studentlife\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/commons.royalroads.ca\/studentlife\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/commons.royalroads.ca\/studentlife\/wp-json\/wp\/v2\/users\/358"}],"replies":[{"embeddable":true,"href":"https:\/\/commons.royalroads.ca\/studentlife\/wp-json\/wp\/v2\/comments?post=1084"}],"version-history":[{"count":1,"href":"https:\/\/commons.royalroads.ca\/studentlife\/wp-json\/wp\/v2\/posts\/1084\/revisions"}],"predecessor-version":[{"id":1087,"href":"https:\/\/commons.royalroads.ca\/studentlife\/wp-json\/wp\/v2\/posts\/1084\/revisions\/1087"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/commons.royalroads.ca\/studentlife\/wp-json\/wp\/v2\/media\/1086"}],"wp:attachment":[{"href":"https:\/\/commons.royalroads.ca\/studentlife\/wp-json\/wp\/v2\/media?parent=1084"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/commons.royalroads.ca\/studentlife\/wp-json\/wp\/v2\/categories?post=1084"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/commons.royalroads.ca\/studentlife\/wp-json\/wp\/v2\/tags?post=1084"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}