Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025
好的,我现在需要帮用户总结一篇关于Adobe Reader零日漏洞的文章,控制在100字以内。首先,我要通读整篇文章,抓住关键信息。 文章提到威胁行为者利用了Adobe Reader的一个未知零日漏洞,通过恶意PDF文档进行攻击,最早可追溯到2025年12月。这些PDF文件可能包含社会工程学元素,比如以发票命名,诱导用户打开。一旦打开,就会执行混淆的JavaScript来收集敏感数据,并接收额外的有效载荷。 研究人员Li指出,这个漏洞利用了Adobe Reader的零日漏洞,允许执行特权API,并且在最新版本中也有效。此外,它还能将收集的信息传送到远程服务器,并接收更多JavaScript代码。这可能为后续的远程代码执行或沙盒逃逸攻击做准备。 文章还提到样本中的PDF使用了俄语诱饵,并涉及俄罗斯石油和天然气行业的当前事件。目前尚不清楚后续攻击的具体性质,因为服务器没有响应请求。 总结时需要涵盖:零日漏洞、Adobe Reader、恶意PDF、社会工程学、数据收集、潜在的RCE/SBX攻击。同时要简洁明了,控制在100字以内。 </think> 威胁行为者利用Adobe Reader的零日漏洞通过恶意PDF文档进行攻击,最早可追溯至2025年12月。这些PDF文件可能包含社会工程学诱饵,诱导用户打开后自动执行混淆的JavaScript以收集敏感数据并接收额外有效载荷。该漏洞利用了未修补的特权API功能,在最新版本中有效,并具备将数据传送到远程服务器的能力。 2026-4-9 11:15:0 Author: thehackernews.com(查看原文) 阅读量:8 收藏

Vulnerability / Threat Intelligence

Threat actors have been exploiting a previously unknown zero-day vulnerability in Adobe Reader using maliciously crafted PDF documents since at least December 2025.

The finding, detailed by EXPMON's Haifei Li, has been described as a highly-sophisticated PDF exploit. The artifact ("Invoice540.pdf") first appeared on the VirusTotal platform on November 28, 2025. A second sample was uploaded to VirusTotal on March 23, 2026.

Given the name of the PDF document, it's likely that there is an element of social engineering involved, with the attackers luring unsuspecting users into opening the files on Adobe Reader. Once launched, it automatically triggers the execution of obfuscated JavaScript to harvest sensitive data and receive additional payloads.

Security researcher Gi7w0rm, in an X post, said the PDF documents observed contain Russian language lures and refer to issues regarding current events related to the oil and gas industry in Russia.

"The sample acts as an initial exploit with the capability to collect and leak various types of information, potentially followed by remote code execution (RCE) and sandbox escape (SBX) exploits," Li said.

"It abuses zero-day/unpatched vulnerability in Adobe Reader that allows it to execute privileged Acrobat APIs, and it is confirmed to work on the latest version of Adobe Reader."

It also comes with capabilities to exfiltrate the collected information to a remote server ("169.40.2[.]68:45191") and receive additional JavaScript code to be executed.

This mechanism, Li argued, could be used to collect local data, perform advanced fingerprinting attacks, and set the stage for follow-on activity, including delivering additional exploits to achieve code execution or sandbox.

The exact nature of this next-stage exploit remains unknown as no response was received from the server. This, in turn, could imply the local testing environment from which the request was issued did not meet the necessary criteria to receive the payload. 

"Nevertheless, this zero-day/unpatched capability for broad information harvesting and the potential for subsequent RCE/SBX exploitation is enough for the security community to remain on high alert," Li said.

(This is a developing story. Please check back for more details.)

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/adobe-reader-zero-day-exploited-via.html
如有侵权请联系:admin#unsafe.sh