Blog Posts Tagged with "PDF"

69dafe8b58066478aea48f3d0f384820

RedKit Private Exploit Tool Emerges in the Wild

May 04, 2012 Added by:Headlines

"RedKit is armed with two of the most popular exploits... The first exploit is a fairly obfuscated PDF file that exploits the LibTIFF vulnerability..." The second is the "latest Java exploit, dealing with the AtomicReferenceArray vulnerability..."

Comments  (0)

71d85bb5d111973cb65dfee3d2a7e6c9

Phishing with PDF's and Why it Works

May 02, 2012 Added by:f8lerror

During many penetration tests the need to social engineer a target may be required. Let’s talk about something that completely relies on the user being conned into following the attackers instructions. The scenario is simple send the user a PDF form and have them submit the form...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Evidence of Chinese Attacks on US Defense Contractors

January 30, 2012 Added by:Pierluigi Paganini

At least six Chinese IP addresses were used to proxy or host the command and control servers. The Netbox webserver is mainly used by those who speak Chinese. In fact, all the documentation to setup and learn the framework is only available in Mandarin...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

US-CERT Warns of Denial-of-Service Malware Campaign

January 26, 2012 Added by:Headlines

US-CERT has received reports of attacks using malware-laden email attachments. The advisory comes one week after multiple DDoS attacks were launched against entertainment industry and US government websites by Anonymous supporters in an operation dubbed OpMegaupload...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Social Engineering: The Tainted PDF and a Sales Call

January 12, 2012 Added by:Infosec Island Admin

Generally, people just aren’t thinking all that much when they get these calls. Sure, people should never be asking them for their passwords, but now this. Open this file would you? Tell me how many pages it has to verify that you got it, would you?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Mikko Hypponen Warns of Adobe Reader Threats

November 11, 2011 Added by:Headlines

F-Secure's Mikko Hypponen urged organizations to reconsider the continued use of Adobe Reader given the tendency for attackers to exploit the application's frequent vulnerabilities. "These attacks are not against PDF - these attacks are against Adobe Reader," said Hypponen...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

F-Secure: Malicious PDFs Targeting Defense Contractors

July 20, 2011 Added by:Headlines

"It's a PDF file... sent to an employee of a targeted company as an email attachment. It exploits a known Javascript vulnerability and drops a... backdoor. A decoy PDF file is shown... [as] a call for papers for 2012 AIAA Strategic and Tactical Missile Systems Conference... classified as SECRET..."

Comments  (1)

69dafe8b58066478aea48f3d0f384820

McAfee: Mobile Malware Growth at All-Time High

February 08, 2011 Added by:Headlines

The growing popularity and variety of mobile communications platforms and a lack of consumer awareness about proper security precautions have provided criminals with ample opportunity to exploit devices like smartphones and tablets...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Nearly Twenty Million New Malware Threats in 2010

January 31, 2011 Added by:Headlines

Almost twenty million new malware threats were identified in 2010, according to research by IT lab AV-Test. The number is more than fifty percent greater than those identified in 2009, and the trend shows an increase in the prevalence of unique malware samples over the last ten years...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

PDFs Now Leading Source of Malware Attacks

January 18, 2011 Added by:Headlines

Exploits utilizing the ubiquitous PDF document now account for as much as 36% of malicious code distribution, and PDFs are the leading source for web-based attacks according to Symantec's Quarterly Global Threat Report...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Security Threats Lurk in Adobe PDF Documents

January 04, 2011 Added by:Headlines

A researcher has identified several flaws in the portable document file standard that produce some serious vulnerabilities. One finding shows the ability for a PDF to contain code for a database scanner that activates when the document is sent to a hub printer and can scan the entire network...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Operation Payback Spokesman Leaves Name in PR Meta Data

December 11, 2010 Added by:Headlines

The rogue hacker group Anonymous, which has been making headlines for their repeated DDoS attacks dubbed Operation Payback, issued a press release. The most interesting piece of information int the release, though, was the name of the text's author, which was present in the PDF's meta data...

Comments  (3)