{"id":547,"date":"2026-04-09T13:11:56","date_gmt":"2026-04-09T13:11:56","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=547"},"modified":"2026-04-09T13:11:56","modified_gmt":"2026-04-09T13:11:56","slug":"adobe-reader-zero-day-exploited-via-malicious-pdfs-since-december-2025","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=547","title":{"rendered":"Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025"},"content":{"rendered":"<div>\n<p><span class=\"p-author\"><i class=\"icon-font icon-user\">\ue804<\/i><span class=\"author\">Ravie Lakshmanan<\/span><i class=\"icon-font icon-calendar\">\ue802<\/i><span class=\"author\">Apr 09, 2026<\/span><\/span><span class=\"p-tags\">Vulnerability \/ Threat Intelligence<\/span><\/p>\n<\/div>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgwKu6NdwE0kgawNywNJK7cGCEdRfzOKwsH9AeIT7zJ49RPq_KJAG3SyjH44SS8Zsd-gAUFDFKnfdpaFH8sAZT9wevB2fS0QVk-gCp8xg7j1XcwGJzv05xpoMN4O-oiEd1v3U3kuqW8cTGk0QlHPPS5GgifHq5DBgrE9R_6GxqxYb1erEN_qvAnUG6VFkx0\/s1700-e365\/adobe.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>Threat actors have been exploiting a previously unknown zero-day vulnerability in Adobe Reader using maliciously crafted PDF documents since at least December\u00a02025.<\/p>\n<p>The finding, detailed by EXPMON&#8217;s Haifei Li, has\u00a0been <a href=\"https:\/\/justhaifei1.blogspot.com\/2026\/04\/expmon-detected-sophisticated-zero-day-adobe-reader.html\">described<\/a> as a highly-sophisticated PDF exploit.\u00a0The <a href=\"https:\/\/www.virustotal.com\/gui\/file\/54077a5b15638e354fa02318623775b7a1cc0e8c21e59bcbab333035369e377f\">artifact<\/a> (\u00abInvoice540.pdf\u00bb) first appeared on the VirusTotal platform on November 28, 2025.\u00a0A <a href=\"https:\/\/www.virustotal.com\/gui\/file\/65dca34b04416f9a113f09718cbe51e11fd58e7287b7863e37f393ed4d25dde7\">second\u00a0sample<\/a> was uploaded to VirusTotal on March 23,\u00a02026.<\/p>\n<p>Given the name of the PDF document, it&#8217;s likely that there is an element of social engineering involved, with the attackers luring unsuspecting users into opening the files on Adobe Reader. Once\u00a0launched, it automatically triggers the execution of obfuscated JavaScript to harvest sensitive data and receive additional\u00a0payloads.<\/p>\n<p>Security researcher Gi7w0rm, in\u00a0an <a href=\"https:\/\/x.com\/Gi7w0rm\/status\/2042003381158379554\">X\u00a0post<\/a>, said the PDF documents observed contain Russian language lures and refer to issues regarding current events related to the oil and gas industry in\u00a0Russia.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/vpn-risk-report-inside-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWajeG0cdaapf1GKTZRUZUB7BzuYGegyw5k0eAorJXlmkFdYCCeLXXhXYJuXU9lWD33rV6rRnIyly3czoNfYifpxk1eGA5slItPmim3HkubXoQMgC4J7hdQPywxGbWq7Eqeff_o6s2Fq-WmSFd5guwdLn7IqpveMqULqtVnd-ndnljWYGj45EkMFB7m0qm\/s728-e100\/z-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>\u00abThe sample acts as an initial exploit with the capability to collect and leak various types of information, potentially followed by remote code execution (RCE) and sandbox escape (SBX) exploits,\u00bb Li\u00a0said.<\/p>\n<p>\u00abIt abuses zero-day\/unpatched vulnerability in Adobe Reader that allows it to execute privileged Acrobat APIs, and it is confirmed to work on the latest version of Adobe\u00a0Reader.\u00bb<\/p>\n<p>It also comes with capabilities to exfiltrate the collected information to a remote server (\u00ab169.40.2[.]68:45191\u00bb) and receive additional JavaScript code to be\u00a0executed.<\/p>\n<p>This mechanism, Li argued, could be used to collect local data, perform advanced fingerprinting attacks, and set the stage for follow-on activity, including delivering additional exploits to achieve code execution or\u00a0sandbox.<\/p>\n<p>The exact nature of this next-stage exploit remains unknown as no response was received from the server. This, in turn, could imply the local testing environment from which the request was issued did not meet the necessary criteria to receive the\u00a0payload.\u00a0<\/p>\n<p>\u00abNevertheless, this zero-day\/unpatched capability for broad information harvesting and the potential for subsequent RCE\/SBX exploitation is enough for the security community to remain on high alert,\u00bb Li\u00a0said.<\/p>\n<p><em>(This is a developing story. Please\u00a0check back for more\u00a0details.)<\/em><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\ue804Ravie Lakshmanan\ue802Apr 09, 2026Vulnerability \/ Threat Intelligence Threat actors have been exploiting a previously unknown zero-day vulnerability in Adobe Reader using maliciously crafted PDF documents since at least December\u00a02025. The&hellip;<\/p>\n","protected":false},"author":1,"featured_media":548,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[1135,1138,128,33,1137,1136,126],"class_list":["post-547","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-adobe","tag-december","tag-exploited","tag-malicious","tag-pdfs","tag-reader","tag-zeroday"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/547","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=547"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/547\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/548"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=547"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=547"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=547"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}