Symantec: Zero-day PDF exploit confirmed

Symantec has confirmed that there is indeed a zero-day “Xmas exploit” that target both Adobe Acrobat and Reader.

The zero-day vulnerability is said to be triggered by malicious PDF attachments which unknowingly being opened by recipients.

“The PDF files we discovered arrives as an email attachment. The attack attempts to lure email recipients into opening the attachment. When the file is opened, a malicious file is dropped and run on a fully patched system with either Adobe Reader or Acrobat installed. Symantec products detect the file as Trojan.Pidief.H.,” Symantec said in a blog post.

According to Symantec, they have already informed Adobe of the vulnerability.

Brad Arkin, Adobe’s director of product security and privacy, said the company learned of the attack Monday.

“This afternoon, Adobe received reports of a vulnerability in Adobe Reader and Acrobat 9.2 and earlier versions being exploited in the wild,” Adobe wrote in a post to its Product Security Incident Response Team blog Monday afternoon.

“We are currently investigating this issue and assessing the risk to our customers.”

Symantec, for the meantime, has urged users to be “extra vigilant” this holiday season  especially when opening attachments received from unknown individuals.

Source: http://www.tgdaily.com/security-features/45078-symantec-confirms-zero-day-pdf-exploit

Published by

Ahleen

Ahleen is a tech columnist who has written about a wide range of technology from driver-less cars to electronic diapers. She is a certified nerd and considers chocolate to be the smartest invention of mankind. View all posts by Ahleen