This highlights the effectiveness of this technique in obscuring malicious URLs. The analysis of the malicious PDF began with the Catalog object (Fig. 2), which is fundamental to a PDF file’s ...