By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025
Computing

Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025

News Room
Last updated: 2026/04/09 at 8:08 AM
News Room Published 9 April 2026
Share
Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025
SHARE

Ravie LakshmananApr 09, 2026Vulnerability / Threat Intelligence

Threat actors have been exploiting a previously unknown zero-day vulnerability in Adobe Reader using maliciously crafted PDF documents since at least December 2025.

The finding, detailed by EXPMON’s Haifei Li, has been described as a highly-sophisticated PDF exploit. The artifact (“Invoice540.pdf”) first appeared on the VirusTotal platform on November 28, 2025. A second sample was uploaded to VirusTotal on March 23, 2026.

Given the name of the PDF document, it’s likely that there is an element of social engineering involved, with the attackers luring unsuspecting users into opening the files on Adobe Reader. Once launched, it automatically triggers the execution of obfuscated JavaScript to harvest sensitive data and receive additional payloads.

Security researcher Gi7w0rm, in an X post, said the PDF documents observed contain Russian language lures and refer to issues regarding current events related to the oil and gas industry in Russia.

“The sample acts as an initial exploit with the capability to collect and leak various types of information, potentially followed by remote code execution (RCE) and sandbox escape (SBX) exploits,” Li said.

“It abuses zero-day/unpatched vulnerability in Adobe Reader that allows it to execute privileged Acrobat APIs, and it is confirmed to work on the latest version of Adobe Reader.”

It also comes with capabilities to exfiltrate the collected information to a remote server (“169.40.2[.]68:45191”) and receive additional JavaScript code to be executed.

This mechanism, Li argued, could be used to collect local data, perform advanced fingerprinting attacks, and set the stage for follow-on activity, including delivering additional exploits to achieve code execution or sandbox.

The exact nature of this next-stage exploit remains unknown as no response was received from the server. This, in turn, could imply the local testing environment from which the request was issued did not meet the necessary criteria to receive the payload. 

“Nevertheless, this zero-day/unpatched capability for broad information harvesting and the potential for subsequent RCE/SBX exploitation is enough for the security community to remain on high alert,” Li said.

(This is a developing story. Please check back for more details.)

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Appknox launches KnoxIQ to prioritize real-world exploitability in AI-driven application security –  News Appknox launches KnoxIQ to prioritize real-world exploitability in AI-driven application security – News
Next Article I Tested a  Chip Bag Sealer to See How Fresh It Could Keep My Precious Snacks I Tested a $13 Chip Bag Sealer to See How Fresh It Could Keep My Precious Snacks
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

One of Shark’s best robot vacs has a massive 50% off right now
One of Shark’s best robot vacs has a massive 50% off right now
Gadget
Did The Lifebelt Survive After Shark Tank? Here’s What Happened After Season 1 – BGR
Did The Lifebelt Survive After Shark Tank? Here’s What Happened After Season 1 – BGR
News
SiFive Raises 0M To Double Down On High Performance RISC-V For Data Centers
SiFive Raises $400M To Double Down On High Performance RISC-V For Data Centers
Computing
Bessent presses Congress to pass crypto rules
Bessent presses Congress to pass crypto rules
News

You Might also Like

SiFive Raises 0M To Double Down On High Performance RISC-V For Data Centers
Computing

SiFive Raises $400M To Double Down On High Performance RISC-V For Data Centers

1 Min Read
China’s CATL to operate 10,000 battery swap stations by 2030 · TechNode
Computing

China’s CATL to operate 10,000 battery swap stations by 2030 · TechNode

2 Min Read
Refiant AI raises  million to build leaner AI models
Computing

Refiant AI raises $5 million to build leaner AI models

6 Min Read
Transform Your Real Estate Website with IDX Broker and WordPress
Computing

Transform Your Real Estate Website with IDX Broker and WordPress

22 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?