Hackers distribute malicious code to attack Reader, Acrobat
Security firm Symantec said that just a few hours after Adobe released a security patch for PDF Reader and Acrobat, the bug was released to the Internet.
'Malicious code is sent in the form of junk email targeting users who have not installed the latest Adobe patch,' Symantec said. Often the attached files containing the exploit code are called ' YOUR_BILL.pdf ' or ' INVOICE.pdf '. If a user accidentally opens files on their PC, they will immediately be infected with a Trojan named ' Pidief.a '. The main function of this Trojan is to disable the Windows firewall and download more malicious code directly from hackers' servers .
'As far as we are concerned, the malicious server still exists on the Internet. The connection between malicious code and server is done via FPT protocol. This is a very well-known server for storing many different types of malicious code, ' Symantec said.
Adobe's patch released on October 22 aimed to address the 'mailto:' handling of PDF Reader and Acrobat. This error can be exploited by hackers to remotely control malicious code on the PC. The root of this error is the URI error in Internet Explorer 7 and Windows XP.
Users are advised to quickly upgrade to Adobe Reader version 8.1.1 and Acrobat 8.1.1.
Hoang Dung
- Hackers spread malicious code to attack Word
- Online video is used to spread malicious code
- Hackers spread malicious code to attack Winamp
- Hackers kidnap Windows Update to spread malicious code
- Hackers use the Olympics to spread malicious code
- Appear malicious code to attack Windows Help error
- Publish malicious code to attack Windows Mobile
- The malicious code attached to the DNA infects the computer itself
- 'Merry Christmas to our heroes' - malicious code installation email
- Warning of malicious code
- The US website contains 63% of the malicious code
- Hackers start exploiting new Excel errors