Recently, I found that PDF files are increasingly used for advanced persistent threat attacks. Can you describe some new technologies used in PDF attacks? In addition, can you recommend some tools that can scan PDF malware? Can anti-malware or email scanning monitor such threats? Nick Lewis: advanced persistent threat (APT) attacks are likely to take advantage of PDF files, because most common users think that PDF files are safe, PDF files are also widely used in commercial and daily email attachments. Hackers use phishing emails to disguise fax messages and scan and send notifications from multi-function printers to lure users into opening "trustworthy" malicious files. To reduce the threat caused by malicious PDF software, it is best to combine security awareness and technical control, because any method cannot protect all situations. Simply put, traditional anti-malware or email scanning cannot process these new pdf file malware attacks. However, security tools that open PDF files in the sandbox environment can be used to identify malicious behaviors in PDF files. SearchSecurity writer Lenny Zeltser described some additional tools in his blog that analyzed malware documentation that can be used to scan potentially malicious PDF files. These tools can identify potentially infected JavaScript code or command strings in files. Once the malware content is extracted, you can analyze the malware content to determine whether the external website has downloaded other malware. Therefore, all PDF files containing JavaScript code or accessing external network systems should be investigated.