Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


03:00 PM
Dark Reading
Dark Reading
Products and Releases

New PDF Exploit Being Circulated In High Volume Through Ongoing Spam Campaign

PDF/Pidief.BV ranked second for overall malware activity this month

SUNNYVALE, Calif., June 3, 2010 - Fortinet' (NASDAQ: FTNT) - a leading network security provider and worldwide leader of unified threat management (UTM) solutions – today announced its May 2010 Threat Landscape report showed a new PDF exploit being circulated in high volume through an ongoing spam campaign. The vulnerability, first blogged about by Didier Stevens on March 29, 2010, is CVE-2010-1240, and the malicious documents now exploiting this are detected by Fortinet as PDF/Pidief.BV!exploit. Though no patch exists, Adobe has recommended mitigation strategies on its blog. To further combat the threat, Fortinet recommends implementing an intrusion prevention and antivirus solution. This vulnerability was ranked second for overall malware activity this month, behind only the nefarious Pushdo botnet.

“What sets PDF/Pidief.BV apart from other PDF threats we are seeing, is that it requires user interaction,” said Derek Manky, project manager, cyber security and threat research, Fortinet. “More specifically, a user needs to click on the ‘open’ button when prompted by a dialog box to initiate the infection. This threat is another reason why it’s imperative for users to carefully read these types of messages when they appear.”

In the case of PDF/Pidief.BV, clicking “open” will first execute VBScript and then add a malicious botnet loader binary, which compromises the system. For detailed information on this specific PDF attack, please view our FortiGuard virus encyclopedia entry here.

Botnet Activity on the Rise

Botnet activity remained strong this report, with Gumblar and Sasfis present in both the Top 10 Attack and Top 10 Malware lists. Though the main botnetssuch as Pushdo, Cutwail and Sasfis continue to pose significant threats, newer botnets are emerging. We first saw the CMultiLoader botnet in the wild on April 8, 2010. A variant of this botnet, W32/CMultiLoader.A, has landed in the sixth spot in our Top 10 Malware list this report. The Katusha botnet just missed our Top 10 list this report, ranking #11. These are two examples of up and coming botnets that are making waves. Fortinet detects the Katusha sample as W32/Katusha.1824!tr. Total detected malware volume for this report has remained fairly consistent since the beginning of the year, though distinct detection continues to rise. This indicates more variations of malware circulating in cyberspace as malware creators continue to pack, encrypt and morph their malicious binaries.

FortiGuard Labs compiled threat statistics and trends for May based on data collected from FortiGate' network security appliances and intelligence systems in production worldwide. Customers who use Fortinet’s FortiGuard Subscription Services should already be protected against the threats outlined in this report.

To read the full May Threat Landscape report which includes the top threat rankings in each category, please visit: http://www.fortiguard.com/report/roundup_may_2010.html. For ongoing threat research, bookmark the FortiGuard Center or add it to your RSS feed. Additional discussion on security technologies and threat analysis can be found at the Fortinet Security Blog. To learn more about FortiGuard Subscription Services, visit http://www.fortinet.com/products/fortiguard.html.

Rick Popko

PR Manager, Corporate Communications

Fortinet - Real Time Network Protection 1090 Kifer Road | Sunnyvale, CA 94086 | USA

Desk: +1 408.486.7853

Mobile: +1 415.425.4756

Skype: rickpopko

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WF800HP firmware Ver1.0.9 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
PUBLISHED: 2021-01-28
Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
PUBLISHED: 2021-01-28
Logstorage version 8.0.0 and earlier, and ELC Analytics version 3.0.0 and earlier allow remote attackers to execute arbitrary OS commands via a specially crafted log file.
PUBLISHED: 2021-01-28
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-35128. Reason: This candidate is a reservation duplicate of CVE-2020-35128. Notes: All CVE users should reference CVE-2020-35128 instead of this candidate. All references and descriptions in this candidate have been removed to preve...