Threat Advisory: PDFast Freeware Compromise

Update: 4/21, 12:06 PM MT: Certificates used for signing malicious versions of PDFast have now been revoked. However, threat actors will keep finding new ways to compromise victims. Todyl will continue monitoring and update detections as needed.

Update: 4/17, 10:48 AM MT: Windows Defender is now blocking PDFast as well, but it appears the attackers are currently manipulating the code to avoid detection. Todyl MXDR and Detections Engineering are actively working to block changes in the code as they arise.

Todyl MXDR team identifies malware distribution in free PDF software

The Todyl MXDR team has detected malware being distributed from within a free PDF tool called PDFast (pdf-fast[.]com). All affected Todyl partners were immediately alerted upon discovery and non-MXDR partners have been notified over email. In addition, the MXDR team pushed out a global block to all EDR customers within 30 minutes of detection. The MXDR team has also pushed a global update to Todyl SASE to block any communication with the malicious sites.

These updates immediately stop further compromise by preventing any communication and/or downloads from the malicious sites.

Stay tuned to this blog post as we will post more updates as we uncover more information.

How it Works

MXDR team uncovered widespread malicious encoded PowerShell originating from “upd.exe”, an update service executable related to the PDFast software. The malicious executable, “upd.exe,” spawns from services.exe which in turn is spawned from svchost.exe, both legitimate Windows processes.

  • svchost.exe hosts services that run from dynamic-link libraries (DLLs). It's very common and is usually the parent process of many service-related processes on a Windows machine.
  • services.exe (specifically Services Control Manager) is responsible for starting, stopping, and interacting with system services.

Using Todyl SIEM, the MXDR team found this malicious executable and subsequent encoded PowerShell were triggered via a PDFast service. This indicates that either the malicious code was introduced within PDFast’s development supply chain or was intentionally included within the software itself.

The encoded PowerShell script, when executed, downloads malware from two malicious URLs hosted in China. Todyl’s MXDR team is currently reverse engineering the payload to determine the full scope of the threat.

The malicious PowerShell was detected via Todyl’s EDR and SIEM simultaneously. Todyl’s EDR in Prevent mode automatically blocks the PowerShell script from running

Affected File Hashes

File Name SHA256 Hash
PDFast.exe 51F3F27B6B54684BD15F477EB932A6071C5BEA74D72DD06A3B4095567888601A
upd.exe 371a3a7ec463ae0148f5ee61d593a3c0b801e9a30747f9a7b4e76c1aeaac09
upd.exe 5b2297d75c73d7efba9bb0a5ee9cb0b8efde2bae35d9a82d0d879001ad5b51
system26506a1616b4007c26874c8f878b30fcddf05c2fd5905296445e789706c9814fba17d08c1ae35a 2eb892b216aba97c468a24706dd3e952e23de6cd2407ed8ba1fdd52f0448f04
updater.exe 6ef80b596195ac002f072811bb2c73e6d45b8f914ada6d1e613ad9abe14bc09c

PDFast Process Tree

What to Do Next

Uninstall all instances of PDFast as soon as possible to prevent further compromise.

MXDR partners, please reach out to your DRAM if you are concerned that you’ve been affected. You may also submit any similar sites of concern to the MXDR team, and we will review them as soon as possible.

If you’re not currently using Todyl EDR or SASE, you can add each product module for immediate protection against this PDFast and other prominent threats. Contact us to learn more.

Todyl updates

Sign-up to get the latest from Todyl sent straight to your inbox.