Cyber Security News

New PDF Tool to Detect Malicious PDF Using PDF Object Hashing Technique

A new open-source tool called PDF Object Hashing is designed to detect malicious PDFs by analyzing their structural “fingerprints.”

Released by Proofpoint, the tool empowers security teams to create robust threat detection rules based on unique object characteristics in PDF files.

This innovation addresses the growing reliance of threat actors on PDFs for delivering malware, credential phishing, and business email compromise (BEC) attacks.

By focusing on document structure rather than volatile elements like URLs or images, the tool enables attribution to specific threat groups, even as attackers evolve their tactics. Proofpoint, a leading cybersecurity firm, developed this technique internally to track multiple threat actors.

PDFs remain a staple in email-based campaigns, often embedding URLs to malware downloads, QR codes directing users to phishing sites, or forged invoices mimicking brands like banks or services.

Proofpoint notes that these files can initiate chains leading to remote access trojans or data theft.

However, the PDF format’s complexity, allowing endless variations for compatibility, poses detection challenges, from encrypted streams hiding URIs to compressed objects obscuring payloads.

The core issue lies in PDF’s flexibility: six valid whitespace types, compressible cross-reference tables, and objects that can embed or reference parameters interchangeably.

Encryption further complicates matters, revealing only the document’s skeleton while concealing details like malicious links.

Traditional signatures falter against these evasions, as minor tweaks render hashes or metadata useless.

PDF Object Hashing sidesteps this by parsing the file’s object hierarchy, extracting types such as Pages, Catalog, XObject/Image, Annotations/Link, Metadata/XML, Producer, and Font/Type1.

These are concatenated in order and hashed into a stable “fingerprint,” akin to imphash for executables. This ignores lure-specific changes, like updated images, allowing clustering of related files.

As Proofpoint demonstrates, overlapping hashes (visualized in green-yellow diagrams) reveal connections across variants, aiding threat hunting without decryption.

Real-World Campaigns Tracked

Proofpoint applied the tool to track UAC-0050, a cluster targeting Ukraine with encrypted PDFs impersonating OneDrive. These deliver NetSupport RAT via JavaScript-laden URLs, evading parsers due to encryption.

Hashing exposed structural similarities, enabling rapid signature creation and payload blocking (e.g., SHA256: ee03ad7c8f1e25ad157ab3cd9b0d6109b30867572e7e13298a3ce2072ae13e5).

Similarly, UNK_ArmyDrive, an India-based actor active since May 2025, uses PDFs in BEC lures like fake Bangladesh Ministry documents (SHA256: 08367ec03ede1d69aa51de1e55caf3a75e6568aa76790c39b39a00d1b71c9084).

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Threat Actors Tricks Target Users Via Impersonation and Fictional Financial Aid Offers

An international ecosystem of sophisticated scam operations has emerged, targeting vulnerable populations through impersonation tactics…

52 seconds ago

TransparentTribe Attack Linux-Based Systems of Indian Military Organizations to Deliver DeskRAT

TransparentTribe, a Pakistani-nexus intrusion set active since at least 2013, has intensified its cyber espionage…

3 hours ago

Jingle Thief Attackers Exploiting Festive Season with Weaponized Gift Card Attacks

As the festive season approaches, organizations are witnessing a disturbing increase in targeted attacks on…

4 hours ago

Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave

The cybersecurity landscape experienced a significant shift in July 2025 when threat actors associated with…

6 hours ago

New Python RAT Mimic as Legitimate Minecraft App Steals Sensitive Data from Users Computer

A sophisticated Python-based remote access trojan has emerged in the gaming community, disguising itself as…

6 hours ago

SideWinder Hacking Group Uses ClickOnce-Based Infection Chain to Deploy StealerBot Malware

The SideWinder advanced persistent threat group has emerged with a sophisticated new attack methodology that…

7 hours ago