Skip to main content

New PDFSider Windows malware deployed on Fortune 100 firm's network

  • January 19, 2026
  • 0 replies
  • 16 views

Jasper_The_Rasper
Moderator
Forum|alt.badge.img+54

January 19, 2026 By Bill Toulas

 

New PDFSider Windows malware deployed on Fortune 100 firm's network

Ransomware attackers targeting a Fortune 100 company in the finance sector used a new malware strain, dubbed PDFSider, to deliver malicious payloads on Windows systems.

The attackers employed social engineering in their attempt to gain remote access by impersonating technical support workers and to trick company employees into installing Microsoft's Quick Assist tool.

Researchers at cybersecurity company Resecurity found PDFSider during an incident response and describe it as a stealthy backdoor for long-term access, noting that it shows "characteristics commonly associated with APT tradecraft."

Legit .EXE, malicious .DLL

A Resecurity spokesperson told BleepingComputer that PDFSider has been seen deployed in Qilin ransomware attacks. However, the company's threat hunting team notes that the backdoor is already "actively used" by multiple ransomware actors to launch their payloads.

The PDFSider backdoor is delivered via spearphishing emails that carry a ZIP archive with a legitimate, digitally signed executable for the PDF24 Creator tool from Miron Geek Software GmbH. However, the package also includes a malicious version of a DLL (cryptbase.dll), which the application requires to function properly.

When the executable runs, it loads the attacker's DLL file, a technique known as DLL side-loading, and provides code execution on the system.

 

>>Full Article<<