Adobe files could soon become attackers' favorite medium for malware delivery, experts say

Tim Wilson, Editor in Chief, Dark Reading, Contributor

September 21, 2007

2 Min Read

A researcher has discovered new vulnerabilities in PDF files that could lay a Windows user's entire hard drive bare for inspection and remote manipulation.

In a new blog posted yesterday, researcher Petko Petkov said he has discovered PDF vulnerabilities that are so dangerous that he will not post a proof of concept until they have been addressed by Adobe, the maker of the PDF technology.

"You have to take my word for it," Petkov says. "The POCs will be released when an update is available."

In the blog's discussion thread, Petkov does include a video that shows how malware buried in a PDF file can enable an attacker to gain access to user data.

"This means that an attacker could gain access to anything on your C: drive -- executable files, your documents, anything," says Paul Henry, vice president of technology evangelism at Secure Computing. "They could make copies of your documents and send them to others. And it requires no other input than the end user clicking on the PDF link."

The new vulnerabilities are actually a follow-on to PDF flaws that were discovered back in January and demonstrated by RSnake of Ha.ckers.org. (See When Your PDF Reader Turns on You.)

Although there was an uptick in PDF spam and pump-and-dump scams shortly after that vulnerability was released, the full potential of the flaws was not realized, Henry says.

"What [Petkov] has done now is develop a more powerful methodology for embedding Javascript in a PDF file," Henry says. "The potential is enormous. It wouldn't surprise me if PDF becomes the next favorite vehicle of choice for delivering malware, especially because it's so readily accepted and trusted by users."

IT and security pros should advise users to be wary of PDF files they receive from unknown users or on public Websites, Henry says. "Even if you know the sender, but weren't expecting a PDF from them, you should check on it."

Enterprises should also consider implementing one of the anti-malware scanning tools that are emerging on the market, Henry advises. "Signature-based tools aren't going to cut it with this sort of threat out there."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Read more about:

2007

About the Author(s)

Tim Wilson, Editor in Chief, Dark Reading

Contributor

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one of the top cyber security journalists in the US in voting among his peers, conducted by the SANS Institute. In 2011 he was named one of the 50 Most Powerful Voices in Security by SYS-CON Media.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights