Recently, security researchers from different organizations are publishing and sharing frequent electronic documents like PDF files. But there are still many organizations that are not aware that these documents can negotiate all the sensitive data such as authors’ names, specifications on the information system, and architecture.
The French National Institute for Research in Computer Science and Automation (INRIA) asserted that it has accumulated and analyzed nearly 39664 PDF files that were published on the websites of 75 security agencies from a total of 47 countries.
According to the experts, all this data can be exploited efficiently by the threat actors to track and later strike an organization. The analyst has recognized only 7 security agencies that have sanitize some of their PDF files before publishing.
The hidden data that was exposed through these PDF files are mentioned below:-
The cybersecurity analysts, Supriya Adhatarao and Cedric Lauradoux of INRIA (French National Institute for Research in Computer Science and Automation) have affirmed that luckily they have recovered the sensitive data that was involved from 76% of the files they analyzed.
Sanitizations tools that are used in this activity are mentioned below:-
The analyst has distinguished four different levels of PDF file sanitization, and here they are:-
Apart from this, there are many PDF files that were published by the agencies that included hidden information which can be utilized to target their employees to execute further ill-disposed activities.
Even the researchers were also able to detect an employee who has not modernized his/her software for 5 years during this investigation. But, Footprinting an organization utilizing its published PDF files is quite effective.
Moreover, the security agencies and other government organizations that are failed to extract this data from their public documents have exposed themselves to attack.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.
Also Read
DNSpooq Vulnerability In DNS software Let Attackers hijack Millions of Network Devices
A recent security assessment by Shelltrail has uncovered three critical vulnerabilities in the IXON VPN…
The role of the Chief Information Security Officer (CISO) has never been more critical. As…
Digital forensics and incident response (DFIR) have become fundamental pillars of modern cybersecurity. As cyber…
In an era where digital identities have become the primary attack vector, CISOs face unprecedented…
In the ever-changing world of cybersecurity, organizations are constantly challenged to choose the right security…
In an era of digital transformation and rising cyber threats, Building Trust Through Transparency has…