Top Banner
Securing Our Cyberspace Copyright © 2009 CyberSecurity Malaysia Ministry of Science, Technology & Innovation FIRST AGM || MIAMI || 14 JUNE 2010 MAHMUD AB RAHMAN (MyCERT, CyberSecurity Malaysia) PDF: Portable Destructive File
51

PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj > endobj …. 5 0 obj >

Feb 21, 2021

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Securing Our Cyberspace Copyright © 2009 CyberSecurity Malaysia

Ministry of Science, Technology & Innovation

FIRST AGM || MIAMI || 14 JUNE 2010

MAHMUD AB RAHMAN

(MyCERT, CyberSecurity Malaysia)

PDF: Portable Destructive File

Page 2: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 2 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

MYSELF

 Mahmud Ab Rahman

 MyCERT, CyberSecurity Malaysia

  Lebahnet(honeynet), Botnet, Malware

Page 3: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 3 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Agenda

  Intro

  PDF Attacks

  Analyzing malicious PDF   Issues

  Reducing/Mitigation The Problem?  Outro/Conclusion

Page 4: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Securing Our Cyberspace Copyright © 2009 CyberSecurity Malaysia

Ministry of Science, Technology & Innovation

INTRO

1)Intro

2)PDF attacks

3)Analyzing

4)Issues

5)Mitigation

6)Conclusion

Page 5: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 5 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

INTRO : PDF 101

  PDF: Portable Destructive File : )

  Portable Document Format

 Open Standard (2008) by Adobe (previously proprietary)

 Mainly for independent format instead of *.doc, .odp, *.xls, *.ppt, *.etc, *.etc

  PDF Reader Applications (Adobe Reader, Foxit Reader, SumatraPDF,etc,etc)

Page 6: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 6 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

INTRO : PDF Format

  Has its own language

  Normally just ASCII characters.(/Filters /application elements are using binary data (stream)

  ASCII – Readable (any text editors will do)   Start with header (%PDF-[version])

  End with eof element (%%EOF)

Page 7: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 7 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

INTRO : PDF Format (diagram)

%PDF-1.1

1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >> stream BT /F1 24 Tf 100 700 Td (Hello w00t!)Tj ET endstream endobj

xref 0 8 0000000000 65535 f 0000000012 00000 n 0000000089 00000 n

trailer << /Size 8 /Root 1 0 R >> startxref 642

%%EOF

PDF Start (version)

PDF Object (obj … endobj) -stream element contains data (“ hello w00t!”). End

with endstream - Normally needs to decode

the data inside stream element

- JavaScript object starts with /JS

- Main subject to be abuse

Cross Reference

Trailer

End of File

Page 8: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 8 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

INTRO : PDF Format

  view inside PDF readers

Page 9: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 9 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

INTRO : Why attacking PDF?

  Just another attacking vector

 Widely used (popular) o Wider target

 Main player application have bugs o Again, wider target o Generate more interest (more bugs after the 1st

one (almost 3 years now))

o Alternative apps will appear - Unfortunately, they also have bugs

  The emerge of client-side attack (PDF plugin on web browser- create more ways to target)

Page 10: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Securing Our Cyberspace Copyright © 2009 CyberSecurity Malaysia

Ministry of Science, Technology & Innovation

PDF ATTACKS

1)Intro

2)PDF attacks

3)Analyzing

4)Issues

5)Mitigation

6)Conclusion

Page 11: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 11 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

PDF Attacks

  History - Used to be a dirty trick by opening malicious web pages

via link. (oh, no,i’m not discussing about this : ) )

- Emerged as client-side attacks becoming more popular

  Abusing bugs on PDF reader (adobe,foxit) to get to client

  Abusing JavaScript (inside PDF reader): o for more reliable exploitation (heap spray) o Crafting payloads (flexible)

o Code obfuscating (make analyzing difficult)

  Social engineering attacks always work : )

Page 12: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 12 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

PDF Attacks: File based attack vector

Resource: F-Secure

Page 13: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 13 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

PDF Attacks: File based attack vector

Resource: F-Secure

Page 14: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 14 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

PDF Attacks: How it works

1

Crafting malicious pdf

3

User open the file with vulnerable pdf reader

2 Forward the pdf file by any means [spam, weblink,web upload,usb,p2p share..etc..etc]

Bug triggered, payload executed

4

Page 15: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 15 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

PDF Attacks: Recent Bugs

  Adobe o getIcon() CVE-2009-0927

o JBIG2 decoder o U3D File Invalid Array Index

o Newplayer() CVE-2009-4324 o LibTIFF CVE-2010-0188

o CVE2010-1297

  Foxit o Code execution CVE-2009-0191

o Code execution CVE-2009-0836 o Code execution CVE-2009-0837

o … …. …

Page 16: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 16 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

  Launch o Launch .exe reside inside PDF file

o Pop up gotcha! - No problem, Didier Stevens solved the gotcha.

o Patched

 Media-Rich o CVE2010-1297- Flash’s bug, PDF can be used as

the transporter.

o Patch is coming…. : )

PDF Attacks: Feature vs Bug ?

Page 17: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 17 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

PDF Attacks: Trends

  Targeted attacks o Gov/Corp events/meeting

o us-j-india strategic dialogue

o Call the Ministry of Defense o  PDF national policy think-tank seminars

o World News o H1N1

o Tibetan Movement o FIFA World Cup 2010

o Your CEO? : )

Page 18: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 18 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

PDF Attacks: Speaking of Social engineering

H1N1 Malicious PDF file Random contents of Malicious PDF file

Page 19: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 19 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

PDF Attacks: Trends

  Integrated into ExploitKits o Fiesta

o LuckySploit o Firepacks

o Neosploits o CrimePacks

o SEO Sploit Pack

Page 20: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 20 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

PDF Attacks: DEMO

Breaking the PDF readers

Page 21: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Securing Our Cyberspace Copyright © 2009 CyberSecurity Malaysia

Ministry of Science, Technology & Innovation

Analyzing Malicious PDF File

1)Intro

2)PDF attacks

3)Analyzing

4)Issues

5)Mitigation

6)Conclusion

Page 22: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 22 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Analyzing Malicious PDF File

Malicious PDF

Page 23: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 23 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Analyzing Malicious PDF File

  ASCII based characters o Any text editors will do

  Some inflators/encoders have been used for data stream o Analysis becomes more complicated

o Can be deflated/decoded using proper library/techniques to reveal normal ascii data

  Understanding on how PDF language syntax is a must (e.g : object references, JavaScript call, etc,etc)

Page 24: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 24 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Analyzing Malicious PDF File

  Bug inside PDF is just a bug, the malicious one is the evil JavaScript (the payload)(err, most of the time) o We need to analyze and identify the payload

  Due to the nature of PDF readers which supports JavaScript, exploitation techniques and payloads crafting are becoming more reliable and flexible o Hence making analysis tougher

  There are non-JavaScript exploits; therefore, disabling JavaScript is not the silver bullet

Page 25: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 25 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Analyzing Malicious PDF File

  Tools of trade: o Pdf-tools (by Didier Steven)

- PDF parser

o JavaScript interpreters (SpiderMonkey, Rhino) - JavaScript interpreter to execute JavaScript code

o Jsunpack (by Blake Hartstein - Auto analysis for PDF file

o File Insight (by McAfee Avertlabs) - Manual analysis to decode/inflate and shellcode

o Analyz3r ( by MyCERT) - Auto analysis for PDF file

- Quick identifier for suspicious PDF files

Page 26: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 26 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Analyzing Malicious PDF File

  Pdf-tools (by Didier Steven) - PDF parser (pdf-parse.py)

Page 27: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 27 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Analyzing Malicious PDF File

  Jsunpack (by Blake Hartstein) - Jsunpack.py

Page 28: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 28 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Analyzing Malicious PDF File

  File Insight (by McAfee Avertlabs) - Manual analysis to decode/inflate and shellcode

Page 29: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 29 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Analyzing Malicious PDF File

  JavaScript interpreters (SpiderMonkey, Rhino) - JavaScript interpreter to execute JavaScript code

- Using patch version by Didier Steven for dumping eval,print output to files

COOL JAVASCRIPT HERE

Page 30: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 30 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Analyzing Malicious PDF File

  JavaScript interpreters (SpiderMonkey, Rhino) - Require JavaScript Interpreter to speed up analysis

Page 31: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 31 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Analyzing Malicious PDF File

  Analyz3r (by MyCERT) - 2 scripts

– Quick and dirty way to identify pdf file (pdftk.rb)

Page 32: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 32 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Analyzing Malicious PDF File

  Analyz3r (by MyCERT) - 2 scripts

–  Extensive analysis for details information (analyz3r.rb)

Page 33: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 33 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Analyzing Malicious PDF File

  Libemu’s sctest (by Giraffe Honeynet) o For shellcode analysis

Page 34: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 34 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Analyzing Malicious PDF File

 Wepawet (iseclab’s fame) o Very cool!!

o Online service o Need to upload the PDF sample and you’re done

o Probably is not so good when it involves your company secret. : )

Page 35: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 35 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Analyzing Malicious PDF File

  Challenges: o JavaScript obfuscated

- Same problem with browser due to JavaScript

- Annoying [ var=unescape() == var = un+escape(); == var a=un; var

b=escape(); var c=a+b ]

- arguments.callee(), getPageNumber(), getAnnotte()

- Anything JS can do, will fits here

Page 36: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 36 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Analyzing Malicious PDF File

Nice JS eh?

Page 37: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 37 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Analyzing Malicious PDF File

  Challenges: o PDF Syntax Coolness

o This.Title.Info // This.Author.Names // This.What.Ever o Difficult for the analyzer to follow the objects reference. o Default JS emulator is not up for this yet

o Encoding/ Compressor o Many of them (FlateDecode/ASCIIHexDecode/JBIG2Decode/

ASCII85Decode/DCTDecode etc..etc)

o Concatenate Filters (/Filter /FlateDecode /ASCIIHexDecode)

o Abbreviation Filter (/Filter [/Fl /AHx] ) == (Filter /FlateDecode /ASCIIHexDecode)

Page 38: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 38 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Analyzing Malicious PDF File

  Challenges: o Parser Problem

o Grep’ing [obj…endobj] or [stream..endstream] ?

o Grep’ing [EOF] ? o Reference loop

o This.Info.Name -> This.Author.Name-> This.Info.Name

o 1 obj 0 /JS 7 0 R -> 7 obj 0 /JS 8 0 R -> 8 obj 0 /JS 10 R

o Embedded malicious PDF inside PDF file. - Manual extracting for the embedded file is difficult.

o PDF file analyzer is not PDF reader - Analyzer needs to understand PDF structure

- Analyzer needs to interpret PDF language

- Eventually it will become PDF reader by itself : )

Page 39: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 39 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Analyzing Malicious PDF File: DEMO

Analyzing Malicious PDF File

Page 40: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 40 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Analyzing Malicious PDF File: DEMO

  Identify the malicious file

  Extract information

  Analyze shellcode

Page 41: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Securing Our Cyberspace Copyright © 2009 CyberSecurity Malaysia

Ministry of Science, Technology & Innovation

Issues with Malicious PDF file

1)Intro

2)PDF attacks

3)Analyzing

4)Issues

5)Mitigation

6)Conclusion

Page 42: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 42 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Issues with Malicious PDF file

  Awareness on malicious PDF o Not only on PDF but also other file formats (file

exploitation + client-side attacks)

  on the fly malicious PDF generator o Difficult to analyze/ be detected by analysis tools

o Have to manually request/download the malicious pdf file (probably its too late when your browser have PDF reader plugins)

Page 43: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 43 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Issues with Malicious PDF file

  JavaScript obfuscating, period :) o Well, javascript fingerprinting is nothing new : )

o JS checking if u’r running inside on the targeted application is common.

o App.version()

  lack of fully functional pdf analyzers as how PDF reader works o Will always be a cat and mouse game

Page 44: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Securing Our Cyberspace Copyright © 2009 CyberSecurity Malaysia

Ministry of Science, Technology & Innovation

Mitigation against Malicious PDF file

1)Intro

2)PDF attacks

3)Analyzing

4)Issues

5)Mitigation

6)Conclusion

Page 45: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 45 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Mitigation

Page 46: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 46 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Mitigation

  Update/patch your PDF reader->eliminated bug, you're save o Not quite true when dealing with 0day

  Analyze/scan PDF file before opening it  Only open PDF attachment from trusted people, at

least with pgp signing :) o Sign the PDF file?. :).paranoid

  Disable JavaScript- minimize the risk of reliable exploitation o Some bugs don’t require JavaScript (still will 0Wn1ng

as usual).

Page 47: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Securing Our Cyberspace Copyright © 2009 CyberSecurity Malaysia

Ministry of Science, Technology & Innovation

Conclusion

1)Intro

2)PDF attacks

3)Analyzing

4)Issues

5)Mitigation

6)Conclusion

Page 48: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 48 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Conclusion

  Awareness on threats against PDF reader still needs more works

  Analysis on malicious PDF is possible by combining multiple tools (editor,decoder,js emulator, shellocde analyzer)

  A better PDF analyzer is urgently needed

Page 49: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Copyright © 2009 CyberSecurity Malaysia 49 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Conclusion

  The complexity of PDF reader will introduce more bugs and vulnerabilities

 With JavaScript support, exploitation will be more reliable (why we still need JavaScript inside PDF file? )

 With JavaScript support, more obfuscated techniques can be implemented

Page 50: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Securing Our Cyberspace Copyright © 2009 CyberSecurity Malaysia

Ministry of Science, Technology & Innovation

Q&A

Page 51: PDF: Portable Destructive File · 2010. 7. 30. · %PDF-1.1 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj …. 5 0 obj << /Length 67 >>

Securing Our Cyberspace Copyright © 2009 CyberSecurity Malaysia

Ministry of Science, Technology & Innovation

THANKS

Email: [email protected] Web: http://www.cybersecurity.my Web: http://www.mycert.org.my Web: www.cybersafe.my Report Incident: [email protected]