Hacking

Shadow attacks allow replacing content in signed PDF files

Boffins from the Ruhr University Bochum (Germany) have disclosed a series of new attack methods, dubbed Shadow attacks, against signed PDF files.

Security researchers from the Ruhr University Bochum (Germany) have devised a series of new attack techniques, dubbed Shadow attacks, against signed PDF files.

In February 2019, the same team of experts found several flaws in popular PDF viewers and online validation services that allow to deceive the digital signature validation process.

Shadow attacks can allow an attacker to manipulate the content of a signed PDF document keeping its signature valid. The attacker can create a document with two different contents:

  • the content expected by the authority reviewing and signing the PDF;
  • the hidden content that will be displayed once the PDF document will be signed.

“The Signers of the PDF receive the document, review it, and sign it. The attackers use the signed document, modify it slightly, and send it to the victims. After opening the signed PDF, the victims check whether the digital signature was successfully verified. However, the victims see different content than the Signers,” wrote the researchers.

The researchers devised three different variants of the Shadow Attacks, allowing to HideReplace, and Hide-and-Replace content in digitally signed PDFs.

The experts tested their attacks against 28 PDF viewer applications and discovered that 15 of them were vulnerable to at least one of the attacks. The list of vulnerable viewers includes Adobe, Foxit, and LibreOffice.

The software firms behind these three applications have already released security fix to prevent Shadows attacks, unfortunately, many other companies behind impacted apps did not respond to the researchers.

The vulnerabilities exploited by the researchers in the Shadow attacks are tracked as CVE-2020-9592 and CVE-2020-9596.

The “Hide” variant of the Shadow Attacks consists in hiding a portion of the content in a PDF behind another layer, such as a full-page image. The attacker sends a document to the signer that contains an image placed on top of the content to hide. Once the document has been signed and sent back to the attacker, they can manipulate it to hide the image from the PDF viewer.

The “Replace” attack sees the attacker appending an object to a signed document, the object is considered harmless and can impact the way the content is presented.

“The main idea of the *Replace* variant is to append new objects to the signed document which are considered harmless but directly influence the presentation of the signed content.” continues the experts.

“For instance, the (re)definition of fonts does not change the content directly. However, it influences the view of the displayed content and makes number or character swapping possible.”

The last attack, the “Hide-and-Replace” variant, allows an attacker to change the entire content of a signed document. The attacker inserts both hidden and visible content into the document using two objects that have the same object ID, and sends it to the signer. Once the attacker receives the signed document, they will append a new Xref table and a new Trailer so that the hidden content is displayed.

“In Hide-and-Replace attack variant, the PDF document contains a second, hidden document with different content. Since the signers cannot detect the hidden (malicious) content, they sign the document. After signing, the attackers receive the document and append only a new Xref table table and Trailer. Within the Xref table table, only one change takes place: the reference to the Description.” the experts explained.

Experts shared all the exploits here.

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, Shadow attacks)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Nova Scotia Power discloses data breach after March security incident

Nova Scotia Power confirmed a data breach involving the theft of sensitive customer data after…

10 hours ago

Coinbase disclosed a data breach after an extortion attempt

Coinbase confirmed rogue contractors stole customer data and demanded a $20M ransom in a breach…

12 hours ago

U.S. CISA adds a Fortinet flaw to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a Fortinet vulnerability to its Known Exploited Vulnerabilities…

22 hours ago

Kosovo authorities extradited admin of the cybercrime marketplace BlackDB.cc

Kosovar citizen extradited to the US for running the cybercrime marketplace BlackDB.cc appeared in federal…

23 hours ago

U.S. CISA adds Microsoft Windows flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft Windows flaws to its Known Exploited…

1 day ago

Ivanti fixed two EPMM flaws exploited in limited attacks

Ivanti addressed two Endpoint Manager Mobile (EPMM) software vulnerabilities that have been exploited in limited…

2 days ago