Foxit PDF Reader’s design flaws make users susceptible to exploitation

Published:

spot_img

PDF Exploit Targeting Foxit Reader Users Discovered by Check Point Research

A PDF exploit targeting Foxit Reader users has been discovered by researchers at Check Point Research, posing a significant threat to unsuspecting users. The exploit takes advantage of the flawed design of warning messages in Foxit Reader, deceiving users into executing harmful commands.

Threat actors have already been utilizing this exploit to distribute malicious PDF files through various channels, including social media platforms like Facebook. When a user opens an altered PDF file, a security warning is triggered. If the user proceeds with the default options, the exploit downloads and executes a payload from a remote server.

The exploit has been used in various malicious campaigns, ranging from espionage to e-crime, with impressive attack chains. One threat actor, APT-C-35 / DoNot Team, was able to perform hybrid campaigns targeting both Windows and Android devices, even bypassing Two Factor Authentication (2FA).

Malware families such as VenomRAT, Agent-Tesla, and NanoCore RAT have been distributed using this exploit. Check Point researchers followed links distributed via Facebook, leading to a long attack chain resulting in the deployment of an info stealer and two crypto miners.

Foxit Reader has acknowledged the issue and plans to resolve it in version 2024 3. In the meantime, users are advised to exercise caution when opening PDF files from unknown sources. This exploit serves as a reminder of the importance of cybersecurity awareness and the potential risks associated with clicking “OK” without understanding the consequences.

spot_img

Related articles

Recent articles

UAE and Serbia Seek $351M Trade Boost with New CEPA Agreement

UAE-Serbia CEPA: A New Era of Economic Collaboration The recently activated Comprehensive Economic Partnership Agreement (CEPA) between the United Arab Emirates (UAE) and Serbia marks...

FBI and Europol Take Down Lumma Stealer Malware Network Behind 10 Million Infections

Disruption of Lumma Stealer Malware: A Major Operation in Cybersecurity Overview of the Operation A significant global effort spearheaded by law enforcement agencies and various private...

Transforming Exposure Management Through AI, Analytics, and Collaboration

Shaping the Future of Exposure Management: Insights from Nanitor's CEO at GISEC Global 2025 A Catalyst for Change in Cybersecurity As the global cybersecurity landscape evolves,...

I Explored a Dark Web Monitoring Service—Here’s What I Discovered

Until recently, I didn’t pay much attention to the dark web. However, after my favorite online service notified me of a data breach, I...