"Snake Keylogger Spreads Through Malicious PDFs"

Researchers at HP Wolf Security have discovered a campaign that combines a malicious PDF file and a 22-year-old Office bug to spread the Snake Keylogger malware. According to the researchers, the campaign's goal is to trick victims with an attached PDF file purporting to contain details on a remittance payment. Instead, it executes the information-stealing malware while employing various evasion techniques to escape detection. Although Microsoft Office formats continue to be popular, this operation demonstrates how attackers are also employing weaponized PDF documents to infect systems. According to researchers at Fortinet, Snake Keylogger is a.NET-based malware that first appeared in late 2020 and is designed to steal sensitive information from a victim's device, such as saved credentials, keystrokes, screenshots of the victim's screen, and clipboard data. This article continues to discuss the new PDF-based threat campaign spreading the Snake Keylogger malware. 

Threatpost reports "Snake Keylogger Spreads Through Malicious PDFs"

Submitted by Anonymous on