PDFSIDER Malware – Exploitation of DLL Side-Loading for AV and EDR Evasion
嗯,用户让我用中文总结这篇文章,控制在100字以内,而且不需要特定的开头。首先,我需要通读文章,抓住主要信息。 文章讲的是PDFSIDER恶意软件,利用DLL侧加载技术绕过杀毒软件和EDR。威胁者通过钓鱼邮件传播,伪装成合法应用,比如PDF24 Creator。这个恶意软件还能作为勒索ware的载荷,被多个团伙使用。 总结的时候要包括:恶意软件名称、技术手段、传播方式、伪装应用、功能以及被滥用的情况。还要注意字数限制,确保简洁明了。 可能的结构是:PDFSIDER利用DLL侧加载绕过安全软件,通过钓鱼邮件传播,伪装成合法应用执行恶意行为,并被多个团伙用于分发勒索ware。 这样应该能覆盖主要内容,并且控制在100字以内。 </think> PDFSIDER恶意软件利用DLL侧加载技术绕过杀毒软件和EDR系统,通过钓鱼邮件传播伪装成合法应用(如PDF24 Creator),执行后门攻击并加密通信。该恶意软件已被多个勒索ware团伙用于载荷分发。 2026-1-20 21:17:39 Author: securityaffairs.com(查看原文) 阅读量:3 收藏

PDFSIDER Malware – Exploitation of DLL Side-Loading for AV and EDR Evasion

Threat actors use PDFSIDER malware with social engineering and DLL sideloading to bypass AV/EDR, and ransomware gangs already abuse it.

Resecurity has learned about PDFSIDER during an investigation of a network intrusion attempt that was successfully prevented by a Fortune 100 energy corporation. The threat actor contacted their staff, impersonating technical support, and used social engineering tactics with QuickAssist in an attempt to gain remote access to their endpoint.

Considering DLL side-loading technique, this attack vector can be effectively exploited by advanced actors to bypass antivirus (AV) and endpoint detection and response (EDR) systems. According to our HUNTER team, PDFSIDER is also already being actively used by several ransomware actors as a payload delivery method.

PDFSIDER is a newly identified malware variant distributed through DLL side-loading, designed to covertly deploy a backdoor with encrypted command-and-control (C2) capabilities. The malware uses a fake cryptbase.dll to bypass endpoint detection mechanisms.

The threat actors launched this campaign using spear-phishing emails that directed victims to a ZIP archive attached to the message. The ZIP archive contains a legitimate EXE file, labeled ‘PDF24 App.’ PDF24 Creator is an application software by Miron Geek Software GmbH used for creating PDF files from any application and for converting files to the PDF format.

The malware is identified as an Advanced Persistent Threat (APT), having characteristics commonly associated with APT tradecraft, including stealthy execution, anti-VM checks, and encrypted communications. PDFSIDER blends traditional cyber-espionage behaviors with modern remote-command functionality, enabling operators to gather system intelligence and remotely execute shell commands covertly.

Threat actors may leverage various decoys to lure victims into opening malicious documents. In one of the recent episodes of the same campaign, the actor also used a fake document designed to appear as if authored by the PLA Intelligence Bureau of the Joint Staff Department (中央军委联合参谋部情报局).

For example, one of the recent malware campaigns identified by Acronis, targeting the U.S. government and attributed to LOTUSLITE, leveraged such a vector combined with geopolitical narratives between the United States and Venezuela as thematic lures. Infrastructure analysis and execution patterns show a moderate-confidence overlap with Mustang Panda tradecraft, including delivery style, loader–DLL separation, and infrastructure usage.

In another campaign identified by Trellix, DLL sideloading was used to distribute a wide assortment of malware, such as Agent Tesla, CryptBot, Formbook, Lumma Stealer, Vidar Stealer, Remcos RAT, Quasar RAT, DCRat, and XWorm. DLL sideloading vulnerability was exploited in a legitimate binary associated with the open-source c-ares library to bypass security controls and deliver a broad range of commodity trojans and stealers.

Resecurity highlighted a trend of targeted spear-phishing, favoring reliable execution techniques such as DLL sideloading over exploit-based initial access to evade detection.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, PDFSIDER)




文章来源: https://securityaffairs.com/187126/malware/pdfsider-malware-exploitation-of-dll-side-loading-for-av-and-edr-evasion.html
如有侵权请联系:admin#unsafe.sh