Threat Actors Weaponize PDF Editor Trojan to Convert Devices into Proxies
quality 9/10 · excellent
0 net
cyber security Cyber Security News THREATS
2 min. Read
Threat Actors Weaponize PDF Editor Trojan to Convert Devices into Proxies
By Aman Mishra
August 21, 2025
Share
Facebook
Twitter
Pinterest
WhatsApp
Researchers have discovered a complex campaign using trojanized software that uses authentic code-signing certificates to avoid detection and turn compromised machines into unintentional residential proxies, according to a recent threat intelligence notice from Expel Security.
The operation begins with files bearing the code-signing signature of “GLINT SOFTWARE SDN. BHD.,” a seemingly legitimate entity whose credentials have been abused to lend credibility to malicious payloads.
Malicious Code-Signing
Central to this scheme is a JavaScript dropper that facilitates the installation of a trojan dubbed “ManualFinder.”
This dropper is deployed through persistent mechanisms tied to the OneStart Browser, a known problematic application with a history of suspicious behavior.
The persistence is achieved via a scheduled task that executes the JavaScript file from the user’s temporary directory, ensuring the malware remains active across system reboots.
Once activated, the JavaScript establishes outbound connections to command-and-control (C2) domains such as mka3e8[.]com and y2iax5[.]com, from which it retrieves and installs the signed ManualFinder executable.
Manual Finder
This multi-stage infection chain highlights the attackers’ focus on stealth and reliability, exploiting trusted certificates to bypass endpoint security controls and user scrutiny.
Dual-Function Malware
Further analysis reveals the insidious nature of the payloads involved. One of the signed files masquerades as a benign PDF editor but harbors trojan capabilities that covertly reconfigure the compromised device into a residential proxy node.
This transformation allows threat actors to route malicious traffic through the victim’s IP address, effectively anonymizing their operations while potentially implicating the infected user in illicit activities.
The ManualFinder application, when executed in a controlled sandbox environment, presents itself as a legitimate utility designed to assist users in locating product manuals, complete with functional search features.
However, its deployment context raises alarms: it is involuntarily installed via the OneStart Browser, despite the associated website promoting it as a free tool without providing any direct download options.
This discrepancy suggests a deliberate strategy to distribute the malware through bundled or hijacked software channels, capitalizing on OneStart’s established reputation for sketchy practices.
According to the report , Expel’s investigation underscores how such dual-purpose malware blends utility with malice, complicating detection efforts as the benign facade can deceive both users and automated scanners.
The overall campaign reflects an evolving threat landscape where attackers weaponize everyday productivity tools, turning them into vectors for proxy networks that support activities like distributed denial-of-service attacks, data exfiltration, or anonymized cyber espionage.
The implications of this trojan are significant for cybersecurity professionals, as it demonstrates the abuse of code-signing infrastructure and the challenges in monitoring persistent, low-profile infections.
Organizations are advised to scrutinize software signatures, monitor scheduled tasks for anomalous JavaScript executions, and block known C2 domains to mitigate risks.
By converting devices into proxies, attackers not only expand their infrastructure but also expose victims to legal and reputational hazards, emphasizing the need for robust threat hunting and endpoint protection strategies.
Indicators of Compromise (IOCs)
Indicator Type Description Value
File Hash (MD5) PDF Editor Trojan d09b667391cb6f58585ead314ad9c599
File Hash (MD5) ManualFinder Executable 1efaffcd54fd2df44ab55023154bec9b
File Hash (MD5) OneStart Browser 27fb60fa0e002bdb628ecf23296884d3
Domain Command-and-Control (C2) mka3e8[.]com
Domain Command-and-Control (C2) y2iax5[.]com
Find this News Interesting! Follow us on Google News , LinkedIn , and X to Get Instant Updates!
Tags
cyber security
Cyber Security News
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.
Hot this week
Infosec- Resources
How To Access Dark Web Anonymously and know its Secretive and Mysterious Activities
June 4, 2023 1
What is Deep Web
The deep web, invisible web, or...
SOC Architecture
How to Build and Run a Security Operations Center (SOC Guide) – 2023
June 3, 2023 12
Today’s Cyber security operations center (CSOC) should have everything...
Cyber Security News
Network Penetration Testing Checklist – 2025
March 2, 2025 0
Network penetration testing is a cybersecurity practice that simulates...
Cyber Security News
Russian Hackers Bypass EDR to Deliver a Weaponized TeamViewer Component
October 18, 2023 0
TeamViewer's popularity and remote access capabilities make it an...
Checklist
Web Server Penetration Testing Checklist – 2026
January 6, 2026 0
Web server pentesting is performed under three significant categories: identity,...
Topics
Acquisition
Adobe
Adware
AI
Amazon
Amazon AWS
AMD
Android
Anti Virus
Antimalware
Antispoofing
ANY RUN
Apache
API
Apple
APT
Artificial Intelligence
Avast
AWS
Azure
Backdoor
Bitcoin
Bluetooth
Botnet
Browser
Buffer over flow
Bug Bounty
Business
Chatbots
ChatGPT
Checklist
Chrome
Cisco
CISO
CISO Advisory
Cloud
Cloud Security
Cloudflare
Computer Security
Course
CPU
Cross site Scripting
cryptocurrency
Cryptocurrency hack
CVE/vulnerability
Cyber Advisory
Cyber AI
Cyber Attack
Cyber Crime
cyber security
Cyber security Course
Cyber Security News
Cyber Security Resources
Dark Web
Data Breach
Data Governance
DDOS
Deals
DeepSeek
Discord
DNS
Dos Attack
Drive
Dropbox
Education
Email
Email Security
Ethical Hacking
Exploit
Exploitation Tools
Extratorrents
FACEBOOK
Featured
Firefox
Firefox News
Firewall
Forensics Tools
game
GenAI
GitHub
GitLab
Gmail
Google
Google dorks
Governance
GRC
Hacking Books
Hacks
Hardware Hacking
HBO
HTML
HTTP
IBM
IIS
Incident Response
Information Gathering
Information Security Risks
Infosec- Resources
Insider Threats
Instagram
More
cyber security
ClickFix, Malicious DMGs Push notnullOSX to macOS Users
0
Hackers are abusing ClickFix commands and booby-trapping DMG installers...
Cyber Security News
Attackers Deploy Hidden Magecart Skimmer on Magento Using SVG onload Abuse
0
Security researchers at Sansec uncovered a large-scale Magecart campaign...
cyber security
New Phishing Campaign Exploits Google Storage to Deliver Remcos RAT
0
A recently observed phishing campaign is abusing Google Cloud...
cyber security
ClickFix Campaign Abuses macOS Script Editor to Deploy Atomic Stealer
0
A refreshed ClickFix campaign that swaps macOS Terminal for Script Editor...
CVE/vulnerability
Technical Details Released for Critical Cisco SSM Command Execution Vulnerability
0
Security researchers have published technical details regarding a highly...
cyber security
STX RAT Hides Remote Desktop, Steals Data to Dodge Detection
0
A stealthy new remote access trojan, dubbed STX RAT, that blends...
Cyber Security News
Microsoft Details How Defender Protects High-Value Assets in Real-World Attacks
0
Microsoft has significantly upgraded its Defender platform to automatically...
Cyber Attack
Fake Security Tool Spreads LucidRook in Taiwan Cyberattacks
0
Hackers are using fake security tools and cleverly crafted...
Related Articles
ClickFix, Malicious DMGs Push notnullOSX to macOS Users
cyber security
April 9, 2026
Attackers Deploy Hidden Magecart Skimmer on Magento Using SVG onload Abuse
Cyber Security News
April 9, 2026
New Phishing Campaign Exploits Google Storage to Deliver Remcos RAT
cyber security
April 9, 2026
ClickFix Campaign Abuses macOS Script Editor to Deploy Atomic Stealer
cyber security
April 9, 2026
Technical Details Released for Critical Cisco SSM Command Execution Vulnerability
CVE/vulnerability
April 9, 2026
Recent News
ClickFix, Malicious DMGs Push notnullOSX to macOS Users
Mayura Kathir - April 9, 2026
Attackers Deploy Hidden Magecart Skimmer on Magento Using SVG onload Abuse
Divya - April 9, 2026
New Phishing Campaign Exploits Google Storage to Deliver Remcos RAT
Mayura Kathir - April 9, 2026
ClickFix Campaign Abuses macOS Script Editor to Deploy Atomic Stealer
Mayura Kathir - April 9, 2026
Technical Details Released for Critical Cisco SSM Command Execution Vulnerability
Divya - April 9, 2026
STX RAT Hides Remote Desktop, Steals Data to Dodge Detection
Mayura Kathir - April 9, 2026