Adobe Reader infections strike in the wild

Share this article:

Exploits of the recently patched Adobe Reader vulnerabilities have been reported in the wild.

Though the proof-of-concept code had just been published earlier this week, it was not surprising that an exploit surfaced so quickly, according to a blog post Friday by Bojan Zdrnja, a volunteer analyst at the SANS Internet Storm Center.

The payload is in a JavaScript object embedded in the PDF document.

The attackers appeared to modify the proof-of-concept so it would evade anti-virus detection, Zdrnja said. He added that as of about 10:50 a.m. EST, no anti-virus products were able to detect the malicious PDF exploit, according to VirusTotal, a malware scanning service. Later Friday afternoon, US-CERT issued a statement that "reports indicate that this exploit is currently undetectable by common antivirus applications."

Core Security Technologies, a security testing software solutions provider and one of the firms credited with discovering the flaw, published sample code when it notified users about the problem.

Adobe suggests users upgrade to version 8.1.3. Users of version 9 for Reader and Acrobat, released in June, are not vulnerable to the flaws.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

More in News

Kevin Mitnick to sell zero-day exploits

Kevin Mitnick's new venture will develop and procure zero-day exploits, then sell them for $100,000 or more.

FBI warns of potential cyber attacks launched by ISIS hacktivists

Following U.S. military airstrikes in the Middle East, the FBI has issued a warning regarding possible cyber threats aimed at U.S. networks and critical infrastructure by hacktivists in support of ISIS.

Report: 75 million records compromised so far in 2014

Report: 75 million records compromised so far in ...

An updated report indicates that since this time last year, breaches have increased by 29.4 percent, with 568 breaches occurring this year.