Actors Behind AppSuite-PDF and PDF Editor Used 26 Code-Signing Certificates to Make Software Appear Legitimate

ActorsBehindAppSuite-PDFandPDFEditorUsed26Code-SigningCertificatestoMakeSoftwareAppearLegitimate

Security researchers have uncovered a sophisticated malware campaign spanning seven years, where threat actors behind AppSuite-PDF and PDF Editor applications systematically abused code-signing certificates to legitimize their malicious software.

The actors, tracked under the malware family name BaoLoader, have utilized at least 26 code-signing certificates obtained through fraudulent business registrations, primarily targeting users seeking PDF editing tools and productivity applications.

The campaign demonstrates a calculated approach to certificate authority manipulation, with threat actors establishing legitimate businesses across multiple jurisdictions including Panama, Malaysia, and the United States.

PDFEditorSource-Expel
PDF Editor (Source – Expel)

These entities served as fronts for obtaining code-signing certificates from major certificate authorities including SSL.com, GlobalSign, DigiCert, and Sectigo.

The malware has been distributed under various guises, including AppSuite-PDF, PDF Editor, ManualFinder, PDFTools, PDFProSuite, and OneStart, often masquerading as potentially unwanted programs (PUPs) while harboring backdoor capabilities.

What sets this campaign apart from typical certificate abuse scenarios is the actors’ consistent pattern of obtaining multiple certificates for identical company names from different certificate authorities.

Expel researchers identified this unusual behavior while analyzing the CertCentral.org database, noting that among over 1,500 documented organizations with abused certificates, these actors were unique in their geographic certificate patterns and systematic approach to legitimacy simulation.

The threat actors’ methodology extends beyond simple certificate procurement to include sophisticated distribution mechanisms.

Files have been uploaded to platforms like VirusTotal under numerous deceptive names, with single executables appearing as “ZoomSetup,” “WinRarSetup,” “MinecraftSetup,” and various PDF-related applications.

This multi-naming strategy indicates deliberate attempts to maximize infection vectors by appealing to diverse user interests and needs.

Certificate Authority Exploitation and Business Registration Patterns

The technical infrastructure behind BaoLoader reveals meticulous planning in certificate acquisition strategies.

The actors established companies with media-focused naming conventions, including GLINT SOFTWARE SDN. BHD., ECHO INFINI SDN. BHD., Summit Nexus Holdings LLC, Apollo Technologies Inc., and Caerus Media LLC.

Each entity was registered with legitimate business documentation, enabling the actors to pass initial certificate authority verification processes.

TheDigicert-issuedcertificateforEclipseMediaInc.usesthesameRDNnumberasthesamecompanynamecertificatesissuedbySectigoGlobalSignandSSL.comSource-Expel
The Digicert-issued certificate for Eclipse Media Inc. uses the same RDN number as the same company name certificates issued by Sectigo, GlobalSign, and SSL.com (Source – Expel)

Analysis of the certificate metadata reveals consistent business serial numbers across multiple certificate authorities for identical company names.

For instance, Eclipse Media Inc. certificates were issued by GlobalSign, SSL.com, Sectigo, and DigiCert, all containing matching business registration identifiers.

This approach allowed the actors to maintain operational continuity when individual certificates faced revocation, seamlessly transitioning between certificate authorities while maintaining the same organizational identity.

The malware’s persistence mechanisms include PowerShell execution designed to load Web Companion components, executing commands that bypass execution policies and load assemblies from encrypted files.

The campaign’s evolution from simple adware distribution to backdoor deployment represents a concerning escalation in threat actor capabilities, demonstrating how certificate abuse can provide extended operational longevity for malicious campaigns targeting productivity software users.

给TA打赏
共{{data.count}}人
人已打赏
Cyber Attack

DarkCloud Stealer Attacking Financial Companies With Weaponized RAR Attachments

2025-9-16 13:58:49

联盟公告

警惕这些风险隐患!国家安全部揭境外黑客网络攻击手段

2025-8-8 15:27:32

个人中心
今日签到
有新私信 私信列表
搜索