• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   adobe acrobat

Adobe Acrobat/Reader getIcon() Vuln Exploit in the Wild

  • Posted on:April 9, 2009 at 5:24 am
  • Posted in:Vulnerabilities
  • Author:
    JJ Reyes (Advanced Threats Researcher)
5

Cyber criminals have now updated their PDF exploits to include the getIcon() vulnerability (CVE-2009-0927). We currently detect this as TROJ_PIDIEF.OE. As usual, we highly encourage users to update now to the latest versions of Adobe Acrobat and Adobe Reader (if you haven’t yet). Reading the security advisory by Adobe closely, we see that this issue…

Read More
Tags: adobe acrobatadobe readerCVE-2009-092Exploit

Portable Document Format or Portable Malware Format?

  • Posted on:February 20, 2009 at 6:03 am
  • Posted in:Exploits, Malware, Vulnerabilities
  • Author:
    Jonathan Leopando (Technical Communications)
4

The Portable Document Format, or PDF for short, has always been a popular way of distributing documents. It’s no surprise then that cybercriminals have tried to use it as a means of spreading malicious files. Yesterday, the Shadowserver Foundation underlined the severity of this problem when they released details about a new vulnerability in versions…

Read More
Tags: 0-dayAdobeadobe 0-dayadobe acrobatadobe exploitadobe pdfadobe readercomputer viruscomputer virus newsExploitfoxitMalwaremalware blogmalware removalpdfpdf 0-dayPDF exploitportable document formatshadowservertrend microzero day

PDF Exploit Causes BSoD???

  • Posted on:June 25, 2008 at 10:44 pm
  • Posted in:Vulnerabilities
  • Author:
    Edgardo Diaz, Jr. (Threats Analyst)
2

We have discovered a new Adobe Reader/Acrobat exploit (detected since 24 June 2008 as TROJ_PIDIEF.AC) hosted on the following URL: http://{BLOCKED}e-actions.com/secure.cgi?… The vulnerability targeted by this Trojan causes Adobe Acrobat to execute arbitrary malicious code that downloads and executes a file found in: http://{BLOCKED}e-actions.com/secure.cgi?… The downloaded file is saved inside a temporary folder as Eyal.exe….

Read More
Tags: adobe acrobatadobe readerbsodbugExploit

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.