Adobe Reader zero day used in phishing attacks

Powered by SC Magazine
 

Drops dll backdoor.

Zero day flaws in the latest versions of Adobe Reader and Acrobat are being exploited for phishing attacks.

Adobe Reader and Acrobat versions 9.5.3, 10.1.5, and 11.0.1 are affected.

The attacks against Reader drop two dll files designed to both distract and compromise victims.

"The first dll shows a fake error message and opens a decoy PDF document, which is usually common in targeted attacks," the researchers wrote in a blog.

"The second dll in turn drops the callback component, which talks to a remote domain." 

Get the latest on important security patches

The team reported the vulnerabilities to Adobe which confirmed the flaws.

"Adobe is aware of a report of a vulnerability in Adobe Reader and Acrobat XI (11.0.1) and earlier versions being exploited in the wild. We are currently investigating this report and assessing the risk to our customers. We will provide an update as soon as we have more information."

The holes were reported less than a week after Adobe issued out-of-band fixes for vulnerabilities in Flash Player (CVE-2013-0633) affected Windows, Mac OS X, Linux and old Android versions.

Those holes were also used in targeted phishing attacks.

Copyright © SC Magazine, UK edition


Adobe Reader zero day used in phishing attacks
 
 
 
Top Stories
ANZ looks to life beyond the transaction
If digital disruptors think an online payments startup could rock the big four, they’ve missed the point of why people use banks, says Patrick Maes.
 
What InfoSec can learn from the insurance industry
[Blog post] Another way data breach laws could help manage risk.
 
A ten-point plan for disrupting security
[Blog post] How can you defend the perimeter when it’s in the cloud?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  29%
 
Application integration concerns
  3%
 
Security and compliance concerns
  27%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  21%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1047

Vote