By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: HP detects new phishing techniques with great realism PDFs
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Mobile > HP detects new phishing techniques with great realism PDFs
Mobile

HP detects new phishing techniques with great realism PDFs

News Room
Last updated: 2025/09/22 at 3:14 AM
News Room Published 22 September 2025
Share
SHARE

HP has published its threat reportwhich reveals how traditional techniques such as el living-off-the-land (LOTL) y el phishing are evolving to avoid security tools based on detection. These techniques, which imply the use of legitimate profits from the system itself to execute attacks, have been part of the arsenal of threat actors for years. Now, HP researchers warn that the use of multiple rare binary in the same campaign makes it even more difficult to distinguish between malicious and legitimate activity.

The report analyzes real cyber attacks, and helps organizations to keep up with the most recent tactics that criminals use to evade detection and compromise teams in a constantly changing criminal panorama. Based on millions of endpoints protected by HP Wolf Security, outstanding campaigns include false adobe reader bills, in a new wave of ultra -elaborate social engineering deceptions.

With her, the attackers embedded a Reserse Shell, a script that gives the device remote control to the attacker, in a small SVG image disguised as an Adobe Acrobat Reader file with a false load bar. This simulation increased the chances of the file to open and activate the infection chain. In addition, they limited the discharge to German -speaking regions to reduce exposure and hinder automatic analysis.

The report also includes the existence of hidden malware in pixelated images. In these cases, the attackers used Microsoft HTML compiled files (CHM) to hide malicious code in image pixels, disguised as project documents. This allowed to deliver an XWORD tools that was executed through a stages infection chain, with multiple LOTL techniques. Powershell was also used to execute a CMD file that eliminated evidence after discharge and execution.

Finally, company experts have found the return of Stealer Lumma through IMG image files. Lumma has been one of the most active malware families of the second quarter, distributed through IMG compressed files that used LOTL techniques to evade security filters. Despite a police offensive against the group that controls it that took place in May 2025, the campaigns continued in June, with the group registering new domains and expanding its infrastructure.

The report, which covers data from April to June 2025, details how cybercounts continue to diversify attack methods to evade detection -based tools. 13 % of the email threats identified by HP Sure click eluded at least one link -door scanner.

On the other hand, compressed files were the most common type of delivery (40%), followed by executables and scripts (35%). The .rra files represented 26% of the attacks, which suggests that the attackers exploit software such as Winrar.

Alex Holland, main threat researcher at HP Security Labhe commented that “The attackers are not reinventing the wheel, but they are refining their techniques. The living-off-the-lond, the reverse Shells and the phishing have exist for decades, but current cybercriminals are perfecting them. We see more and more chained LOTL tools and unbrusted file types, such as images, to avoid detection. A complete Trojan is not needed when a simple script can achieve the same effect. It is simple, fast and usually goes unnoticed by its low profile”.

Ian Pratt, Global Security Chief for Personal Systems at HPhe added that “Living-off-the-lond techniques are notoriously difficult to detect because it costs to differentiate between legitimate and malicious activity. It is a difficult choice: to restrict too much and hinder the user or leave the door open and risk an attacker. Even the best detection systems sometimes fail; Therefore, the deep defense approach with containment and isolation is essential to catch threats before they cause damage«.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article NetEase’s 24 Entertainment reveals trailer for action-adventure game Blood Message · TechNode
Next Article Saints vs. Seahawks Livestream: How to Watch NFL Week 3 Online Today
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Philips TAA6219
Gadget
The Shark Matrix Plus robot vacuum is at its lowest-ever price — save $400 right now at Amazon
News
The one Windows feature everyone should turn off immediately for privacy
Computing
Does The iPhone Air Bend? Here’s How Much Force Is Needed To Break It – BGR
News

You Might also Like

Mobile

Forget Consoles! These Gaming Phones Under 1 Lakh Are Outperforming Laptops and Even Rival Gaming PCs

0 Min Read
Mobile

Mark Zuckerberg doesn’t care to lose $ 200,000 million in AI. The real risk would not be betting on it, ensures

4 Min Read
Mobile

Who is the new Chinese owner of the French Happn Meeting App?

3 Min Read
Mobile

Think You Can’t Get a 108MP Camera Phone Under Rs 20,000? These Amazon Deals Prove You Can

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?