Watch Out for Weaponized PDF Purchase Orders Containing Hidden Malicious Scripts

Watch Out for Weaponized PDF Purchase Orders Containing Hidden Malicious Scripts
Watch Out for Weaponized PDF Purchase Orders Containing Hidden Malicious Scripts
A recent phishing campaign disguised as a purchase order PDF is targeting business users with well-crafted lures designed to harvest corporate credentials and system data.

The malicious file, titled “NEW Purchase Order #52177236.pdf”, was first flagged after Malwarebytes blocked access to a suspicious link embedded within the document.

class="wp-block-heading" id="h-malicious-pdf-targets-business-emails">Malicious PDF Targets Business Emails

The PDF appeared to contain a purchase order button labeled “View Document”, adding a sense of legitimacy. However, hovering over the button revealed a long, deceptive URL hosted on the ionoscloud.com subdomain, a legitimate European cloud service provider.

Attackers are increasingly abusing reputable infrastructure such as IONOS Cloud, AWS, and Azure because domains from trusted providers are less likely to be automatically blocked by security software.

When the victim clicks the button, the link redirects to a fake PDF viewer hosted on a compromised website, which pre-fills the recipient’s email address in a login form. The page prompts users to log in with a “business email login,” tricking them into providing corporate credentials.

This broad prompt is meant to capture credentials that could unlock valuable enterprise accounts, such as Microsoft Outlook, Google Workspace, VPNs, or file-sharing systems.

The fraudulent site appeared in Spanish, beginning with the greeting “Estimado,” suggesting a regional focus on Spanish-speaking organizations.

Obfuscated JavaScript Sends Stolen Data to Telegram

Security researchers investigating the phishing infrastructure discovered a heavily obfuscated JavaScript file spanning over 113,000 lines of code.

Upon deobfuscation, the script revealed several layers that collected not only usernames and passwords but also additional metadata including browser type, operating system, language, screen size, IP-based geolocation, and even cookies.

Further analysis showed that the stolen data was transmitted directly to the attacker’s Telegram bot, using a hardcoded chat ID (5485275217).

Malwarebytes blocked this ionoscloud.com subdomain
Malwarebytes blocked this ionoscloud. Com subdomain

Telegram’s encrypted messaging makes it a convenient hub for threat actors, enabling the instant relay of stolen information without maintaining their own servers.

Researchers also found multiple similar PDFs on VirusTotal that linked to the same IONOS Cloud subdomain, indicating the campaign’s wide distribution and the automated deployment of cloned phishing templates.

Staying Safe from PDF Phishing Traps

Organizations are urged to handle unsolicited purchase order attachments with caution. Verify such documents directly with the sender before opening or clicking on any embedded links.

Real-time protection tools like Malwarebytes Premium and Scam Guard can detect and block these malicious links. Using a password manager also helps prevent accidental credential entry on counterfeit sites.

Weaponized PDFs remain a persistent phishing tactic; one click can hand over your business credentials directly to cybercriminals.

Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates

The post Watch Out for Weaponized PDF Purchase Orders Containing Hidden Malicious Scripts appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading