A sophisticated phishing campaign has been uncovered, leveraging malicious PDFs disguised as official U.S. Postal Service (USPS) communications to target mobile users.
This attack, identified by Zimperium’s zLabs team, employs a novel obfuscation technique to bypass traditional endpoint security measures and steal sensitive data, including credentials and payment information.
The campaign begins with SMS messages claiming undelivered USPS packages and includes an attached PDF file. The PDFs appear legitimate but contain hidden clickable elements that redirect users to phishing websites.
These sites impersonate USPS pages, prompting victims to input personal details such as names, addresses, and credit card information under the guise of resolving delivery issues.
The attackers then encrypt the stolen data and transmit it to their servers.
The malicious PDFs exploit the Portable Document Format’s (PDF) structure, which is composed of objects like strings, arrays, dictionaries, and streams.
While the experts at Zimperium noted that the hyperlinks in PDFs are represented using a “Go-To-URI” action dictionary object with a “/URI” tag.
However, the attackers bypass this standard by embedding links within compressed stream objects. This unconventional method hides the URLs from both users and most endpoint security tools.
For example, the embedded links are hidden using white text or graphical overlays within the PDF content stream.
The attackers also split URLs across multiple objects to further evade detection. When opened on mobile devices, where visibility into file contents is limited—these techniques make the malicious links nearly undetectable.
Are you from SOC/DFIR Teams? - Analyse Malware Files & Links with ANY.RUN Sandox -> Try for Free
The investigation revealed over 20 malicious PDFs and 630 phishing pages targeting organizations in more than 50 countries. This large-scale operation demonstrates the growing sophistication of phishing campaigns aimed at exploiting trusted brands like USPS.
Mobile platforms are particularly vulnerable due to their limited visibility into file metadata and content before opening.
Unlike desktop systems with robust email and file security measures, mobile devices often lack equivalent protections.
Cybercriminals exploit this gap by leveraging social engineering tactics that capitalize on users’ trust in official-looking documents.
To protect against such attacks, organizations and individuals should adopt layered security measures:
Ukrainian security agencies have issued an urgent warning regarding a sophisticated malware campaign targeting government…
Cybersecurity researchers have uncovered a sophisticated Android malware campaign targeting seniors through fraudulent travel and…
A sophisticated malicious package has infiltrated the Python Package Index (PyPI), masquerading as a legitimate…
Google has introduced a new AI-powered ransomware detection feature for Google Drive for desktop, designed…
The cybersecurity landscape witnessed the emergence of a sophisticated rootkit variation, FlipSwitch, targeting modern Linux…
A sophisticated DNS-based malware campaign has emerged, utilizing thousands of compromised websites worldwide to deliver…