How trojan pretends to be a PDF file using the RLO . method
This is quite dangerous, because a file that you download from the Internet and think it is a PDF file, can actually contain an extremely dangerous virus. Have you ever wondered how attackers can accomplish this?
What is the RLO method?
Many languages can be written from right to left, such as Arabic, Urdu and Persian. Many attackers use this language to launch various attacks. A text that makes sense and is safe to read from the left can actually carry different content when read from the right and refer to a completely different file. You can use the RLO method that exists in the Windows operating system to handle languages written from right to left.
There is an RLO notation for this in Windows. As soon as you use this character, the computer will start reading the text from right to left. Attackers take advantage of this to hide the executable file name and extension.
For example, you enter an English word from left to right and the word is Software. If you add the Windows RLO symbol after the letter T, anything you type after that will be read from right to left. As a result, your new word will be Softeraw.
For a better understanding, see the diagram below.
Can a Trojan be placed in a PDF file?
In some attacks, hackers can put malicious exploits or scripts inside PDF files. Many different tools and programs can do this. This can even be done by changing the existing code of the PDF without using any other program.
However, the RLO method is different. With the RLO method, the attackers present an existing EXE file as if it were a PDF file to deceive the target victim. Only the appearance of the EXE changes, so the target user opens the file believing it to be a harmless PDF file.
How to use the RLO . method
Before explaining how to display the EXE as a PDF using the RLO method, review the image below. Which of these files is a PDF?
You cannot determine this at a glance. Instead, you need to see the contents of the file. (In case you're curious, the file on the left is the actual PDF file).
This trick is quite easy to do. First, the attackers write malicious code and compile it. The compiled code gives output in exe format. Attackers change the name and icon of this EXE file, changing its appearance to a PDF. So how does the renaming process happen?
This is where RLO comes into play. For example, suppose you have an EXE file named iamsafefdp.exe. At this stage, the attacker will put an RLO symbol between iamsafe and fdp.exe to rename the file. It's pretty easy to do this in Windows. Just right click while renaming.
The principle is simple, after Windows sees the RLO symbol, it will read from right to left. File is still EXE, nothing has changed. It just looks like a PDF in appearance only.
After this stage, the attacker will replace the icon of the EXE file with the icon of the PDF file and send the file to the target.
The image below is the answer to the previous question. The EXE you see on the right was created using the RLO method. In appearance, both files are similar, but their contents are completely different.
How to counter this type of attack?
As with many security incidents, there are some precautions you can take to prevent this type of attack. The first is to use the rename option to check the file you want to open. If you choose the rename option, the Windows operating system will automatically select the editable area, in addition to the file extension. The unselected part will be the actual file extension. If you see EXE format in the unchecked section, you should not open this file.
You can also check if hidden characters are inserted using the command line. To do this, simply use the dir command as follows.
As you can see in the screenshot above, util is a weird file, so you should question it.
Be careful before downloading files!
As you can see, even a simple PDF file can leave your device in the hands of attackers. That's why you shouldn't arbitrarily download every file you see on the Internet. No matter how safe you think they are, be careful!
Before downloading a file, you can take some precautions, like making sure that the website you are downloading from is trustworthy and scanning the file with an online file checker.
You should read it
- It's BBC's turn to be spoofed by trojans to spread
- What is Trojan Dropper?
- Again Trojan appeared to attack Mac OS
- Appeared Trojans spy on businesses
- Trojan forged Microsoft security warnings
- The fake Trojan add-on Trojan is extremely dangerous
- Microsoft warned the Emotet trojan back on a large scale, stealing the victim's banking information
- Carefully stolen information with Trojan - How to disable Trojan
May be interested
- Appeared Trojans spy on businessesbitdefender warned of the dangers of a new spy trojan described by them as 'scary rivals', which can be used as an enterprise scout tool.
- Apple fake Trojan sales announcementsecurity firm sophoslabs has warned about the spread of a backdoor trojan called troj / downdec-a. this trojan takes advantage of an apple sales announcement (about the ipod) to attack a user's computer.
- Trojan-Dropper.Win32.Agent.albvthis is a malicious trojan. it adds its executable file to the list of trusted applications in windows firewall ...
- New generation extortion trojan detectionthe new generation of extortion trojans is much more dangerous because of the use of an anonymous tor network and a stronger encryption method.
- How to remove OSDSoft Trojan DBUpdater.exe Minerosdsoft dbupdater.exe miner is a trojan that uses computer cpu resources to dig electronic money. when installed, the trojan launches an executable file with a random name, which uses up to 90% of the computer's cpu, when displayed in task manager.
- Learn about Gutmann data deletion methodthe gutmann method is one of several software-based data sanitization methods, used in some file shredder and data destruction programs, to overwrite existing information on a hard drive or other storage device.
- The fake Trojan add-on Trojan is extremely dangeroussecurity firm mcafee yesterday discovered a fake trojan as an add-on for the firefox browser to break into users' systems.
- Method in HTTPthe set of common methods for http / 1.1 is defined below and this set of settings can be expanded based on the requirements. these method names are case-sensitive and they must be used in uppercase.
- Appeared trojan trojan antivirus tool for mobilethis trojan called doomboot.g specializes in pretending to be an antivirus application called exovirusstop by exosyphen studios. jarno niemela, a virus researcher with security firm f-secure, said that this was the first trojan to attack
- Microsoft warned the Emotet trojan back on a large scale, stealing the victim's banking informationafter 5 months of silence, from february 2020 until now, the emotet trojan has just officially returned with a larger scale.