![]() The malicious PDF files are detected as and the dropped files as Trojan Horse. Once the unsuspecting user visits the website or opens the PDF this exploit will allow further malware to be dropped onto the victim’s machine. Typically an attacker would entice a user to visit a malicious website or send a malicious PDF via email. The authors of the exploit have managed to take a bug and turn it into a reliable exploit using a heap spray technique. What was even more surprising was that this vulnerability affects Adobe Flash - not Adobe Reader as we initially suspected. And, during the analysis it soon became apparent that this vulnerability was not one we had seen in the wild before. It was quite clear that this PDF was exploiting some vulnerability in order to drop its payload. Recently we came into possession of an Adobe Acrobat PDF file that upon opening drops and executes a malicious binary.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |