Exploits against patched Adobe Reader continue

Share this article:

Exploits to Adobe Reader in the form of malicious PDF files continue to pose an in-the-wild threat for unpatched users.

The issue: A trojan can be installed on unpatched users' machines if they unknowingly access a malicious website or are redirected there from malicious banners and ads, according to Trend Micro's research labs. Adobe issued a new version of Adobe Reader on Nov. 4 to address the latest flaws.

Whomever was responsible for the initial attacks, which struck soon after the new version was released, appear to have created a slightly different variant that is evading detection by most anti-virus solutions, wrote Swa Frantzen, handler at the SANS Internet Storm Center.

The new PDF has similar content and was discovered on the same website the initial file was hosted, he wrote.

The attack works when a PDF with embedded exploit code is hosted on a website. When a user visits the website, the hostile code is loaded by the vulnerable package -- in this case Adobe Reader -- onto the user's computer, Ken Dunham, director of global response for iSight Partners, told SCMagazineUS.com Wednesday

Dunham said it is normal for anti-virus solutions to miss emerging threats. On average, AV companies are slow to respond, taking about one to six months to process the average threat.

“Bad actors normally test their code to make sure it's not detected before launching it,” Dunham said. “So you can be sure your anti-virus isn't going to detect it.”

For added protection, Dunham suggested enterprises and home users consider applying the workaround of disabling JavaScript from executing in PDF viewers.

“If you thought your AV was going to protect you, you're wrong,” Dunham said. “AV isn't going to protect you from the latest and greatest threats.”

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Email promises free pizza, ensnares victims in Asprox botnet instead

Email promises free pizza, ensnares victims in Asprox ...

Cloudmark came upon an email that offers free pizza, but clicking on the link to get the coupon ends with victims being ensnared in a botnet.

Report: most orgs lacking in response team, policies to address cyber incidents

In its Q3 threat intelligence report, Solutionary learned that 75 percent of organizations it assisted had no response team or policies and procedures to address cyber incidents.

Flash redirect campaign impacts Carnegie Mellon page, leads to Angler EK

Flash redirect campaign impacts Carnegie Mellon page, leads ...

Malwarebytes found that, since early July, thousands of sites had been targeted in the campaign.