2 min read

Adobe Reader Zero Day Built into $50,000 "Designer" Crimeware Kit

Loredana BOTEZATU

November 09, 2012

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
Adobe Reader Zero Day Built into $50,000 "Designer" Crimeware Kit

Adobe Reader, one of the most popular targets for cyber-criminals, has been slammed with another zero day exploit that can allegedly bypass the sandbox implemented in version 10.

According to the team at Group-IB, the exploit is now on sale on underground markets for prices between $30,000 and $50,000 as part of a custom-made version of the popular Blackhole crimeware kit. The exploitation mechanism goes like this: malicious code that exploits the Adobe vulnerability is added to a PDF file hosted on a website.

As a victim clicks a link to the file, the Reader plugin attempts to load the PDF file. When it is loaded, arbitrary shellcode is executed, and bypasses the security container implemented in Reader versions 10 and above.

“The vulnerability has some limitations, for example it could be successfully exploited only after the user will close the browser and restart it. Another variant is to organize interaction between the victim and the malformed PDF-document,” Komarov said. “Either way, the vulnerability is has very significant vector to be spread with bypassing of internal Adobe X sandbox, which is appealing for cybercrime gangs because in the past there was no documented method of how to bypass it with shellcode execution.”

The discovery of a zero-day exploit of this magnitude also poses serious risks for enterprises, who frequently deal with PDF files sent via e-mail as part of their day-to-day business. While exe files are filtered at the gateway firewall, PDF files are allowed to get in unhindered bundled with missed spam. Plus, as the regular patch cycle in an enterprise is once every 30 days, the attackers would have a pretty large window of opportunity between the time that Adobe comes out with a fix and the actual deployment across the company.

Bottom line: use an antivirus solution with built-in anti-spam and don`t forget to double-check the origin of an e-mail before popping the attachment open.

tags


Author



Right now

Top posts

The Holiday Guide to Tech Support: Fixing the Family Computer

The Holiday Guide to Tech Support: Fixing the Family Computer

November 24, 2021

2 min read
Bitdefender Celebrates 20 Years of Cybersecurity Leadership

Bitdefender Celebrates 20 Years of Cybersecurity Leadership

November 04, 2021

3 min read
Bitdefender Study Reveals How Consumers Like (and Dislike) Managing Passwords

Bitdefender Study Reveals How Consumers Like (and Dislike) Managing Passwords

October 26, 2021

3 min read
What are drive-by download attacks and how do you prevent them?

What are drive-by download attacks and how do you prevent them?

October 25, 2021

2 min read
Criminals Can't Wait to Add Your IoT Device to Their DDoS Networks

Criminals Can't Wait to Add Your IoT Device to Their DDoS Networks

October 22, 2021

2 min read
Six in 10 Consumers Faced a Cyber Threat in 2021, New Bitdefender Study Reveals

Six in 10 Consumers Faced a Cyber Threat in 2021, New Bitdefender Study Reveals

October 20, 2021

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Chrome 96 Gets 22 More Security Fixes with New Incremental Update Chrome 96 Gets 22 More Security Fixes with New Incremental Update
Filip TRUȚĂ

December 08, 2021

1 min read
Most Employees Believe Passwords Affect Their Productivity, Research Finds Most Employees Believe Passwords Affect Their Productivity, Research Finds
Silviu STAHIE

December 06, 2021

1 min read
US State Department iPhones Infected with Pegasus Spyware – Report US State Department iPhones Infected with Pegasus Spyware – Report
Filip TRUȚĂ

December 06, 2021

2 min read