{"id":6893,"date":"2021-06-15T08:44:38","date_gmt":"2021-06-15T12:44:38","guid":{"rendered":"https:\/\/www.technewsday.com\/?p=6893"},"modified":"2021-08-03T10:54:47","modified_gmt":"2021-08-03T14:54:47","slug":"solarmarker-malware-uses-pdfs-and-seo-keywords-to-spread","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/solarmarker-malware-uses-pdfs-and-seo-keywords-to-spread\/","title":{"rendered":"SolarMarker Malware Uses PDF&#8217;s and SEO Keywords To Spread"},"content":{"rendered":"\n<p>Attackers behind the malware, known as SolarMarker, use PDF documents that contain search engine optimization (SEO) keywords to increase their visibility in search engines, leading potential victims to malware on a website that mimics Google Drive.<\/p>\n\n\n\n<p>SolarMarker is a backdoor malware that steals data and credentials from infected browsers.<\/p>\n\n\n\n<p>The hacker&#8217;s host pages on Google pages that serve as a lure for malicious downloads.<\/p>\n\n\n\n<p>The malicious software is primarily aimed at North American users.<\/p>\n\n\n\n<p>Once opened, the PDFs ask users to download a doc or pdf file, which then redirects users to 7 pages of TLDs such as. site,. tk and. ga. <\/p>\n\n\n\n<p>After several redirects, users arrive at a page that is very similar to Google Drive but actually controlled by the attackers.<\/p>\n\n\n\n<p>The page then exfiltrates stolen data to a command-and-control server and continues by creating shortcuts in the startup folder and modifying shortcuts on the desktop.<\/p>\n\n\n\n<p>The SEO poisoning technique seems to be very effective since Microsoft 365 Defender has blocked thousands of pdf documents in different environments.<\/p>\n\n\n<p>For more information, read the <a href=\"https:\/\/www.zdnet.com\/article\/this-data-and-password-stealing-malware-is-spreading-in-an-unusual-way\/\" target=\"_blank\" rel=\"noopener\">original story<\/a> in ZDNet.<\/p>","protected":false},"excerpt":{"rendered":"<p>SolarMarker malware uses PDF&#8217;s with SEO keywords to infect browsers.<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[16],"tags":[],"class_list":["post-6893","post","type-post","status-publish","format-standard","hentry","category-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/6893","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=6893"}],"version-history":[{"count":4,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/6893\/revisions"}],"predecessor-version":[{"id":6902,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/6893\/revisions\/6902"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=6893"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=6893"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=6893"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}