Menu
Padlock sitting on keyboard with colorful light trails
Scam TypesMarch 20, 2026- Leo

PDF Malware in 2026: How Fake Documents Install Trojans on Your Computer

Why PDFs Are the Top Malware Delivery Format

PDFs are the most common file format used to deliver malware, according to Palo Alto Networks Unit 42 research. Attackers prefer PDFs because they are universally trusted, expected in business contexts, and capable of embedding executable content, links, and scripts that most recipients will not question.

ScamVerify™ tracks 74,032 malicious domains through URLhaus and 60,758 indicators of compromise through ThreatFox. A growing share of these threat indicators are connected to campaigns that begin with a malicious PDF delivered by email.

The DEAD#VAX Campaign: A Case Study

One of the most sophisticated PDF malware campaigns in recent years is DEAD#VAX, identified by security researchers at Securonix. This campaign demonstrates how far attackers have evolved beyond simple malicious attachments.

How DEAD#VAX Works

  1. The victim receives an email with an attached PDF that appears to be an invoice, shipping notification, or business document
  2. The PDF contains a link rather than embedded malware, bypassing many email security scanners
  3. Clicking the link downloads a virtual hard disk (VHD) file disguised as a PDF, using a double extension (e.g., "Invoice_March.pdf.vhd")
  4. Windows automatically mounts the VHD as a virtual drive when opened
  5. The mounted drive contains a shortcut file that executes a PowerShell script
  6. The script downloads and installs AsyncRAT, a remote access trojan that gives the attacker full control of the victim's computer

AsyncRAT allows attackers to:

  • Record keystrokes to capture passwords and sensitive data
  • Access files on the infected computer and connected network drives
  • Control the webcam and microphone for surveillance
  • Deploy additional malware including ransomware
  • Exfiltrate data silently over extended periods

Why This Technique Evades Detection

DefenseWhy It Fails Against DEAD#VAX
Email attachment scanningPDF itself contains no malware, only a link
URL filteringDownload link may be hosted on compromised legitimate site
File type blockingVHD files are legitimate Windows disk images
Antivirus scanningPayload is encrypted and downloaded in stages
User awarenessFile appears to be a normal PDF invoice

The multi-stage delivery chain means no single security tool sees the complete attack. Each stage appears benign in isolation.

Common PDF Malware Techniques in 2026

Embedded JavaScript

PDFs support embedded JavaScript that executes when the file is opened. While modern PDF readers disable JavaScript by default, many enterprise environments re-enable it for legitimate PDF functionality. Malicious JavaScript can:

  • Redirect to phishing websites
  • Download and execute files
  • Exploit vulnerabilities in the PDF reader

Phishing Links Disguised as Buttons

The simplest and most common technique: a PDF with a professional design that includes a "View Invoice," "Download Statement," or "Verify Account" button. The button links to a malicious URL that either delivers malware or leads to a credential harvesting page.

Form-Based Data Collection

PDFs support interactive forms. Attackers create documents with fillable fields that submit data to attacker-controlled servers. The victim fills out what appears to be a legitimate form (tax document, application, verification) and sends their personal information directly to the attacker.

Encrypted PDFs With Password Bait

Attackers send a PDF protected with a password, then provide the password in the email body. This technique bypasses security scanners (which cannot open password-protected files) and makes the document feel more confidential and legitimate.

File Types That Disguise Malware as Documents

PDFs are not the only document format weaponized by attackers:

File TypeRisk LevelCommon Disguise
.pdfHighInvoices, receipts, contracts, shipping notices
.docx (with macros)HighBusiness proposals, HR documents, legal forms
.xlsx (with macros)HighFinancial reports, purchase orders, data exports
.html (as attachment)Medium"View in browser" redirects to phishing
.vhd/.isoMediumMounted disk images containing executables
.zip/.rarMediumCompressed archives hiding executables

How to Stay Safe From PDF Malware

1. Do Not Open Unexpected Attachments

If you receive a PDF you were not expecting, verify its legitimacy before opening. Contact the sender through a separate channel (phone call, separate email) to confirm they sent the document.

2. Disable JavaScript in Your PDF Reader

In Adobe Acrobat: Edit > Preferences > JavaScript > uncheck "Enable Acrobat JavaScript." In most cases, legitimate PDFs do not require JavaScript to function.

3. Use Preview Mode

Open PDFs in your operating system's built-in preview tool (Preview on macOS, Microsoft Edge PDF viewer on Windows) rather than full-featured PDF editors. Preview tools execute less embedded content and provide a safer viewing environment.

4. Watch for Double Extensions

Files with names like "Invoice.pdf.vhd" or "Contract.pdf.exe" are disguised executables. Windows hides known file extensions by default, so "Invoice.pdf.vhd" may appear as just "Invoice.pdf." Enable "Show file extensions" in your file manager settings.

5. Upload Suspicious Documents to ScamVerify

The ScamVerify document checker analyzes uploaded PDFs and images using AI. The analysis extracts all text content, identifies embedded phone numbers, email addresses, and URLs, then checks each entity against 8 million+ threat records. This catches documents that reference known malicious infrastructure even when the PDF itself does not contain malware.

Upload a document to analyze

Upload any PDF, image, or document to check for signs of fraud or manipulation.

Analyze Document

The Business Impact

PDF malware campaigns frequently target businesses because:

  • Employees expect to receive PDFs (invoices, contracts, reports) as part of normal operations
  • Business PDFs often require opening attachments rather than viewing in a browser
  • A single infected workstation can provide access to the entire corporate network
  • Business accounts and data are more valuable than individual consumer data

The FBI's Internet Crime Complaint Center reports billions in annual losses from attacks that begin with malicious document delivery, making document security a critical business concern.

FAQ

Can opening a PDF infect my computer?

On a fully updated system with modern PDF reader defaults, simply viewing a PDF is very low risk. The danger comes from clicking links within the PDF, enabling JavaScript execution, opening embedded files, or downloading additional files prompted by the PDF. Keep your software updated and avoid interacting with unexpected content within PDFs.

Is it safe to open PDFs in a web browser?

Generally safer than opening in a full PDF editor. Modern browsers (Chrome, Edge, Firefox) render PDFs in a sandboxed environment that limits the impact of any malicious content. However, phishing links within the PDF still work, so verify before clicking any link.

How does ScamVerify's document analysis work differently from antivirus?

Antivirus scans for known malware signatures within the file. ScamVerify's document analysis takes a different approach: it extracts the human-readable content (text, phone numbers, URLs, email addresses) and checks those entities against threat intelligence databases. This catches documents that are part of fraud schemes even when the PDF itself is technically clean.

What should I do if I already opened a suspicious PDF?

If you only viewed the PDF without clicking links or enabling macros, the risk is low on an updated system. If you clicked a link or downloaded additional files, disconnect from the internet, run a full antivirus scan, and change passwords for any accounts you accessed from that computer. Report the incident to your IT department if applicable.

Photo by FLY:D on Unsplash

Check any phone number, website, text, email, document, or QR code for free.

Instant AI analysis backed by millions of federal records and real-time threat data.

Check Now