• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
adobe reader zero day exploited via malicious pdfs since december 2025

Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025

You are here: Home / General Cyber Security News / Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025
April 9, 2026

Threat actors have been exploiting a previously unknown zero-day vulnerability in Adobe Reader using maliciously crafted PDF documents since at least December 2025.

The finding, detailed by EXPMON’s Haifei Li, has been described as a highly-sophisticated PDF exploit. The artifact (“Invoice540.pdf”) first appeared on the VirusTotal platform on November 28, 2025. A second sample was uploaded to VirusTotal on March 23, 2026.

Given the name of the PDF document, it’s likely that there is an element of social engineering involved, with the attackers luring unsuspecting users into opening the files on Adobe Reader. Once launched, it automatically triggers the execution of obfuscated JavaScript to harvest sensitive data and receive additional payloads.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Security researcher Gi7w0rm, in an X post, said the PDF documents observed contain Russian language lures and refer to issues regarding current events related to the oil and gas industry in Russia.

Cybersecurity

“The sample acts as an initial exploit with the capability to collect and leak various types of information, potentially followed by remote code execution (RCE) and sandbox escape (SBX) exploits,” Li said.

“It abuses zero-day/unpatched vulnerability in Adobe Reader that allows it to execute privileged Acrobat APIs, and it is confirmed to work on the latest version of Adobe Reader.”

It also comes with capabilities to exfiltrate the collected information to a remote server (“169.40.2[.]68:45191”) and receive additional JavaScript code to be executed.

This mechanism, Li argued, could be used to collect local data, perform advanced fingerprinting attacks, and set the stage for follow-on activity, including delivering additional exploits to achieve code execution or sandbox.

The exact nature of this next-stage exploit remains unknown as no response was received from the server. This, in turn, could imply the local testing environment from which the request was issued did not meet the necessary criteria to receive the payload. 

“Nevertheless, this zero-day/unpatched capability for broad information harvesting and the potential for subsequent RCE/SBX exploitation is enough for the security community to remain on high alert,” Li said.

(This is a developing story. Please check back for more details.)

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «bitter linked hack for hire campaign targets journalists across mena region Bitter-Linked Hack-for-Hire Campaign Targets Journalists Across MENA Region

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025
  • Bitter-Linked Hack-for-Hire Campaign Targets Journalists Across MENA Region
  • New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy
  • Masjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT Devices
  • APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies
  • Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)
  • Anthropic’s Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems
  • N. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, Rust
  • Iran-Linked Hackers Disrupt U.S. Critical Infrastructure by Targeting Internet-Exposed PLCs
  • Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign

Copyright © TheCyberSecurity.News, All Rights Reserved.