In Q4 2024, while reviewing the EXPMON Public analysis data, I discovered an interesting "zero-day behavior" in some PDF samples. I want to emphasize that this was not a zero-day attack — at least for the samples EXPMON analyzed, there is no evidence suggesting they were created with malicious intent. However, the samples exhibited an unpatched, previously unknown behavior when opened with Adobe Reader or Foxit Reader in EXPMON's sandboxes. If this behavior were discovered by a malicious attacker, it could be easily weaponized. This is why I refer to it as "zero-day behavior" rather than a "zero-day attack".
Let's dive into the details using one of the detected samples as an example. For the following particular PDF sample.
PS: The sample is on VT uploaded like two years ago. I've temporarily shared it via Google Drive (zip password "expmon"), for those who want to study it but don't have a VT paid account.
https://pub.expmon.com/analysis/189957/
My analysis showed that the key content of the sample is as the follows.
5 0 obj
<< /Type /Action
/S /Launch
/F (/Applications/Calculator.app/Contents/MacOS/Calculator)
>>
endobj
On Adobe Reader, if the PDF sample is opened directly, the application will attempt to locate a computer named "Applications". If it finds the computer, it will try to connect to the server and send the local (net)NTLM information to it. Although a warning message will appear, the information leak will have already occurred by that point.
"The team mentioned that DNS/NTLM calls only for intranet domains, not for internet domains. According to the design, Acrobat considers intranet domains to be trusted when the "Automatically trust sites from Win OS security zones" feature is enabled. This feature is enabled by default in Acrobat."
For Foxit Reader, they've acknowledged this is a security vulnerability and has released a patch addressing the issue in December.
"We are delighted to announce the launch of Foxit PDF Reader for Windows v2024.4, the version have addressed this issue you reported.The products are available immediately. You are encouraged to download your copy of Foxit PDF Reader from our website.Reader: https://www.foxit.com/pdf-reader/Security Bulletins: https://www.foxit.com/support/security-bulletins.htmlThanks for your continuous support of our product security."
Conclusion
As described in our Methodology & Architecture, EXPMON employs an approach/cycle like this: big data analytics → identify missed threats → improve detection. Even though a novel zero-day threat may not be detected immediately, future Big Data Analytics (BDA) allow us to identify the threat and improve detection. This finding is a good example of the power of the BDA analysis and why EXPMON is capable of detecting the most undetected file-based zero-day exploits.
If you're interested in advanced exploit detection collaborations or just want to learn more about EXPMON, feel free to reach out to us on Twitter/X at @EXPMON_ or email us at contact@expmon.com. The EXPMON system could be deployed on-premise in internal networks as an advanced tool to combat unknown and zero-day threats.