Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

PUA.Pdf.Trojan.Embedded.JavaScript-1 #134

Open
baboeska opened this issue Jul 21, 2024 · 3 comments
Open

PUA.Pdf.Trojan.Embedded.JavaScript-1 #134

baboeska opened this issue Jul 21, 2024 · 3 comments

Comments

@baboeska
Copy link

Just did a clamav scan and this zip came back as having a trojan in the PDF, the ai_thinker_esp32cam.pdf.
Interestingly, my arduino IDE has a lot of JavaScript requests while compiling.
Strangely, I never opened that PDF.
I've noticed suspicious activity on port 9050 on phone and Linux desktop, found this while searching.
Correlation is not causation.
I hope this is of use,

Thanks

@rzeldent
Copy link
Owner

Hi Banoeska,

Where is this file located? I do not see it in the repo.
But indeed watch out. Some pdf's can be infected!

@baboeska
Copy link
Author

baboeska commented Jul 21, 2024

Hi Rzeldent,
Possibly a secondary library required for compilation with latest IDE, but probably not.
I flattened it from low orbit last night, so I sadly can't say. Also flattened another internal hdd and n external HDD both had software not hardware failures after contact.
Physical access and USB key upload is a possible vector re infection,and presence of esp32 security system may have contributed to infected file location.
Also noted any external or internal drive apart from main stopped functioning at software level.
I believe it may have been a gateway to a zero day exploit that uses tor socks proxy and perhaps ipv6 tunnels to communicate.
Sad to lose some photos etc, but, that needed flattening.
Glad to know it's not in the repo.
Damn it, next time virus total upload for sure.
I had never opened said pdf.
I'm sorry I can't be more helpful, I'll try to get more data and flatten slower if it happens again, assuming that feels safe.
I wonder re Arduino ides java script aspects and zero day potential.

Best wishes

@baboeska
Copy link
Author

baboeska commented Jul 21, 2024

It showed up in the zip as well.
I wonder as to dns spoofing potential to deliver malware in place of actuals via compromised hidden proxies. Seems far fetched but it is what it is.
Have had major issues dling from GitHub without a VPN in the past.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants