LmCast :: Stay tuned in

New PDFSider Windows malware deployed on Fortune 100 firm's network

Recorded: Jan. 19, 2026, 9:03 p.m.

Original Summarized

New PDFSider Windows malware deployed on Fortune 100 firm's network

News

Featured
Latest

StealC hackers hacked as researchers hijack malware control panels

Hackers now exploiting critical Fortinet FortiSIEM flaw in attacks

Malicious GhostPoster browser extensions found with 840,000 installs

Cisco finally fixes AsyncOS zero-day exploited since November

UK govt. warns about ongoing Russian hacktivist group attacks

Hacker admits to leaking stolen Supreme Court data on Instagram

Jordanian pleads guilty to selling access to 50 corporate networks

Ingram Micro says ransomware attack affected 42,000 people

Tutorials

Latest
Popular

How to access the Dark Web using the Tor Browser

How to enable Kernel-mode Hardware-enforced Stack Protection in Windows 11

How to use the Windows Registry Editor

How to backup and restore the Windows Registry

How to start Windows in Safe Mode

How to remove a Trojan, Virus, Worm, or other Malware

How to show hidden files in Windows 7

How to see hidden files in Windows

Webinars
Downloads

Latest
Most Downloaded

Qualys BrowserCheck

STOPDecrypter

AuroraDecrypter

FilesLockerDecrypter

AdwCleaner

ComboFix

RKill

Junkware Removal Tool

Deals

Categories

eLearning

IT Certification Courses

Gear + Gadgets

Security

VPNs

Popular

Best VPNs

How to change IP address

Access the dark web safely

Best VPN for YouTube

Forums
More

Virus Removal Guides
Startup Database
Uninstall Database
Glossary
Send us a Tip!
Welcome Guide

HomeNewsSecurityNew PDFSider Windows malware deployed on Fortune 100 firm's network

New PDFSider Windows malware deployed on Fortune 100 firm's network

By Bill Toulas

January 19, 2026
04:00 PM
0

Ransomware attackers targeting a Fortune 100 company in the finance sector used a new malware strain, dubbed PDFSider, to deliver malicious payloads on Windows systems.
The attackers employed social engineering in their attempt to gain remote access by impersonating technical support workers and to trick company employees into installing Microsoft's Quick Assist tool.
Researchers at cybersecurity company Resecurity found PDFSider during an incident response and describe it as a stealthy backdoor for long-term access, noting that it shows "characteristics commonly associated with APT tradecraft."

Legit .EXE, malicious .DLL
A Resecurity spokesperson told BleepingComputer that PDFSider has been seen deployed in Qilin ransomware attacks. However, the company's threat hunting team notes that the backdoor is already "actively used" by multiple ransomware actors to launch their payloads.
The PDFSider backdoor is delivered via spearphishing emails that carry a ZIP archive with a legitimate, digitally signed executable for the PDF24 Creator tool from Miron Geek Software GmbH. However, the package also includes a malicious version of a DLL (cryptbase.dll), which the application requires to function properly.
When the executable runs, it loads the attacker's DLL file, a technique known as DLL side-loading, and provides code execution on the system.

The executable's valid signatureSource: Resecurity
In other cases, the attacker attempts to trick email recipients into launching the malicious file by using decoy documents that appear to be tailored to the targets. In one example, they used a Chinese government entity as the author.
Once launched, the DLL runs with the rights of the executable that loaded it.
"The EXE file has a legitimate signature; however, the PDF24 software has vulnerabilities that attackers were able to exploit to load this malware and bypass EDR systems effectively," Resecurity explains.
According to the researchers, finding vulnerable software that can be exploited is becoming easier for cybercriminals, due to the rise of AI-powered coding.
PDFSider loads straight into memory, leaving minimal disk artifacts, and uses anonymous pipes to launch commands via CMD.
Infected hosts are assigned a unique identifier, and system information is collected and exfiltrated to the attacker’s VPS server over DNS (port 53).
PDFSider protects its command-and-control (C2) exchange by using the Botan 3.0.0 cryptographic library and AES-256-GCM for encryption, decrypting incoming data in memory to minimize its footprint on the host.
Moreover, the data is authenticated using Authenticated Encryption with Associated Data (AEAD) in GCM mode.
"This type of cryptographic implementation is typical of remote shell malware used in targeted attacks, where maintaining the integrity and confidentiality of communications is critical," Resecurity notes.

PDFSider operational overviewSource: Resecurity
The malware also features several anti-analysis mechanisms, such as RAM size checks and debugger detection, to exit early when signs of running in a sandbox are detected.
Based on its assessment, Resecurity says that PDFSider is closer to "espionage tradecraft than financially motivated malware" and is built as a stealthy backdoor that can maintain long-term covert access and provide flexible remote command execution and encrypted communication.

Secrets Security Cheat Sheet: From Sprawl to Control
Whether you're cleaning up old keys or setting guardrails for AI-generated code, this guide helps your team build securely from the start.
Get the cheat sheet and take the guesswork out of secrets management.
Download Now

Related Articles:
Ransomware IAB abuses EDR for stealthy malware executionCISA warns of Chinese "BrickStorm" malware attacks on VMware serversSmartTube YouTube app for Android TV breached to push malicious updateIngram Micro says ransomware attack affected 42,000 peopleStealC hackers hacked as researchers hijack malware control panels

Backdoor
DLL Side-Loading
Malware
PDFSider
Ransomware
Signature

Bill Toulas
Bill Toulas is a tech writer and infosec news reporter with over a decade of experience working on various online publications, covering open-source, Linux, malware, data breach incidents, and hacks.

Previous Article

Post a Comment Community Rules

You need to login in order to post a comment
Not a member yet? Register Now

You may also like:

Popular Stories

Microsoft: Some Windows PCs fail to shut down after January update

Microsoft: Windows 11 update causes Outlook freezes for POP users

StealC hackers hacked as researchers hijack malware control panels

Sponsor Posts

New webinar: Choose-your-own-investigation walkthrough of modern browser attacks

Discover how to scale IT infrastructure reliably without adding toil or burnout.

  Upcoming Webinar

Follow us:

Main Sections

News
Webinars
VPN Buyer Guides
SysAdmin Software Guides
Downloads
Virus Removal Guides
Tutorials
Startup Database
Uninstall Database
Glossary

Community

Forums
Forum Rules
Chat

Useful Resources

Welcome Guide
Sitemap

Company

About BleepingComputer
Contact Us
Send us a Tip!
Advertising
Write for BleepingComputer
Social & Feeds
Changelog

Terms of Use - Privacy Policy - Ethics Statement - Affiliate Disclosure

Copyright @ 2003 - 2026 Bleeping Computer® LLC - All Rights Reserved

Login

Username

Password

Remember Me

Sign in anonymously

Sign in with Twitter

Not a member yet? Register Now


Reporter

Help us understand the problem. What is going on with this comment?

Spam

Abusive or Harmful

Inappropriate content

Strong language

Other

Read our posting guidelinese to learn what content is prohibited.

Submitting...
SUBMIT

By Bill Toulas, a tech writer specializing in cybersecurity and malware analysis, the article details a sophisticated cyberattack targeting a Fortune 100 financial firm using a novel malware strain called PDFSider. The breach, uncovered by cybersecurity researchers at Resecurity, highlights the evolving tactics of ransomware actors who exploit vulnerabilities in legitimate software to deploy stealthy backdoors. The attack leveraged social engineering techniques, including impersonation of technical support personnel, to trick employees into installing Microsoft’s Quick Assist tool. However, the true threat lay in a malicious payload hidden within a seemingly benign software package, demonstrating how attackers increasingly rely on compromised third-party applications to bypass security measures. Resecurity’s findings reveal that PDFSider is not merely a ransomware tool but a sophisticated backdoor designed for long-term surveillance and data exfiltration, aligning with advanced persistent threat (APT) strategies rather than traditional financially motivated malware. The report underscores the growing challenge of detecting such threats, as they exploit legitimate digital signatures and AI-driven coding to evade detection.

The malware’s deployment method hinges on a deceptive spearphishing campaign that delivers a ZIP archive containing both a legitimate and malicious component. The package includes a digitally signed executable for the PDF24 Creator tool, developed by Miron Geek Software GmbH, which appears trustworthy to users. However, the archive also contains a malicious version of the cryptbase.dll file, a critical dependency for the PDF24 application. When the legitimate executable runs, it inadvertently loads the attacker’s DLL through a technique known as DLL side-loading, which allows unauthorized code execution without triggering standard security alerts. This method exploits vulnerabilities in the software’s trust mechanisms, as Resecurity notes that attackers can bypass endpoint detection and response (EDR) systems by leveraging known flaws in widely used applications. The malicious DLL operates with the same privileges as the legitimate program, enabling it to execute commands and exfiltrate data without requiring elevated user permissions. The attackers further obfuscate their activities by using decoy documents that appear tailored to specific targets, such as emails purportedly authored by a Chinese government entity, which adds a layer of credibility to the phishing attempt.

PDFSider’s design emphasizes stealth and persistence, making it particularly challenging to detect and mitigate. Unlike traditional malware that leaves persistent files on a system’s disk, PDFSider loads directly into memory, minimizing its digital footprint. This approach reduces the likelihood of detection by traditional file-based security tools and complicates forensic analysis. The malware uses anonymous pipes to communicate with its command-and-control (C2) server, a technique that allows it to execute arbitrary commands via the Windows Command Prompt (CMD). Once activated, PDFSider collects system information and transmits it to an attacker-controlled virtual private server (VPS) over DNS traffic, which is typically allowed through firewalls and not scrutinized for malicious activity. The data exfiltration process employs AES-256-GCM encryption via the Botan 3.0.0 cryptographic library, ensuring that communications remain confidential and tamper-proof. This level of encryption is commonly associated with sophisticated cyber operations, as it prevents adversaries from intercepting or altering the data transmitted between infected systems and the C2 infrastructure. Additionally, PDFSider uses Authenticated Encryption with Associated Data (AEAD) in Galois/Counter Mode (GCM), which further enhances the integrity of its encrypted communications by verifying that the data has not been altered during transmission.

To evade analysis and detection, PDFSider incorporates multiple anti-sandboxing mechanisms that terminate its execution if it detects a virtualized or monitored environment. These include checks for unusual RAM configurations, the presence of debuggers, and other indicators commonly used by researchers to study malware behavior. By exiting early when such conditions are met, the malware avoids being reverse-engineered or its tactics exposed. This defense mechanism is particularly effective against automated analysis tools that rely on isolated environments to dissect malware samples. Resecurity’s analysis also highlights the broader implications of PDFSider’s design, noting that its characteristics align more closely with espionage tradecraft than typical ransomware operations. Unlike financially motivated malware, which often seeks to encrypt data and demand immediate payment, PDFSider is built for long-term covert access, allowing attackers to maintain control over infected systems while remaining undetected. This suggests that the malware may be part of a broader campaign targeting sensitive organizational data, potentially for intelligence gathering or corporate espionage.

The incident also underscores the growing role of AI in both offensive and defensive cybersecurity practices. Resecurity points out that the rise of AI-powered coding tools has made it easier for cybercriminals to identify and exploit vulnerabilities in software, reducing the technical barriers to launching sophisticated attacks. This trend is reflected in PDFSider’s ability to leverage existing software flaws without requiring custom exploit development, which lowers the cost and complexity of cyber operations. The malware’s use of a legitimate digital signature further illustrates how attackers are increasingly exploiting trust mechanisms within software ecosystems to bypass security controls. By embedding malicious components within trusted applications, adversaries can circumvent traditional antivirus solutions and evade detection by users who might otherwise be cautious about downloading unknown files. This tactic is particularly effective in enterprise environments, where employees are often required to install software from third-party vendors, creating opportunities for attackers to infiltrate networks under the guise of legitimate updates or tools.

The financial sector, which was targeted in this case, is a prime focus for cybercriminals due to its handling of sensitive data and high-value assets. However, the attack on a Fortune 100 firm demonstrates that no organization is immune to such threats, regardless of its size or resources. The breach highlights the importance of continuous threat monitoring and proactive security measures, such as regular vulnerability assessments and employee training on recognizing social engineering tactics. Resecurity’s findings also emphasize the need for organizations to adopt advanced detection technologies that can identify anomalous behavior within their networks, such as unusual DNS traffic or unauthorized data exfiltration. Given the complexity of modern malware like PDFSider, traditional signature-based approaches are insufficient, and defenders must rely on behavioral analysis and machine learning models to detect threats that operate in memory or use encrypted communication channels.

The incident also raises questions about the security of third-party software and the responsibility of vendors to address vulnerabilities promptly. The PDF24 Creator tool, which was exploited in this attack, likely had known security flaws that attackers were able to exploit. While the software’s digital signature provided a veneer of trust, it did not guarantee its安全性, as attackers were able to compromise the supply chain by embedding malicious code within a legitimate package. This underscores the need for organizations to implement strict software validation processes, such as verifying digital signatures against known good hashes and monitoring for unexpected changes in application behavior. Additionally, vendors must prioritize security updates and transparency to ensure that their products are not used as vectors for cyberattacks.

As the threat landscape continues to evolve, incidents like the PDFSider attack serve as a reminder of the critical importance of adaptive cybersecurity strategies. The use of AI in both offensive and defensive contexts will likely shape the future of cyber operations, with attackers leveraging automation to scale their efforts and defenders employing machine learning to detect emerging threats. Organizations must remain vigilant by investing in advanced threat intelligence, fostering a culture of security awareness among employees, and adopting multi-layered defense mechanisms that can withstand sophisticated attacks. The case of PDFSider illustrates how even well-protected enterprises can fall victim to cybercriminals if they fail to account for the full spectrum of threats, from social engineering to supply chain compromises. By understanding the tactics employed in such attacks, organizations can better prepare for and mitigate the risks posed by increasingly complex malware.