Foxit PDF Reader’s design flaws make users susceptible to exploitation

Published:

spot_img

PDF Exploit Targeting Foxit Reader Users Discovered by Check Point Research

A PDF exploit targeting Foxit Reader users has been discovered by researchers at Check Point Research, posing a significant threat to unsuspecting users. The exploit takes advantage of the flawed design of warning messages in Foxit Reader, deceiving users into executing harmful commands.

Threat actors have already been utilizing this exploit to distribute malicious PDF files through various channels, including social media platforms like Facebook. When a user opens an altered PDF file, a security warning is triggered. If the user proceeds with the default options, the exploit downloads and executes a payload from a remote server.

The exploit has been used in various malicious campaigns, ranging from espionage to e-crime, with impressive attack chains. One threat actor, APT-C-35 / DoNot Team, was able to perform hybrid campaigns targeting both Windows and Android devices, even bypassing Two Factor Authentication (2FA).

Malware families such as VenomRAT, Agent-Tesla, and NanoCore RAT have been distributed using this exploit. Check Point researchers followed links distributed via Facebook, leading to a long attack chain resulting in the deployment of an info stealer and two crypto miners.

Foxit Reader has acknowledged the issue and plans to resolve it in version 2024 3. In the meantime, users are advised to exercise caution when opening PDF files from unknown sources. This exploit serves as a reminder of the importance of cybersecurity awareness and the potential risks associated with clicking “OK” without understanding the consequences.

spot_img

Related articles

Recent articles

127 Organizations Rally Against Proposed Changes to GDPR and EU Data Protection Laws

A coalition of 127 civil society organizations and trade unions has come together to express their opposition to proposed modifications that they...

Washington Post Confirms Data Breach: CL0P Claims Over 40 Oracle Targets

The Washington Post has confirmed that it recently suffered a data breach linked to a concentrated threat campaign exploiting vulnerabilities...

Exploring Africa’s Oil and Gas Future: G20 Forum Fireside Chats

Exploring Africa’s Energy Future: Insights from the G20 Africa Energy Investment Forum On November 21, Johannesburg will host the G20 Africa Energy Investment Forum, organized...

100 Visionary U.S. Cybersecurity Leaders Paving the Way for a Safer Digital Future

Celebrating Cybersecurity Leadership in the U.S. The landscape of cybersecurity in the United States is continually evolving, and a new initiative by The Cyber Express...