{"id":45254,"date":"2026-04-09T17:29:04","date_gmt":"2026-04-09T09:29:04","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/09\/hackers-exploiting-acrobat-reader-zero-day-flaw-since-december\/"},"modified":"2026-04-09T17:29:04","modified_gmt":"2026-04-09T09:29:04","slug":"hackers-exploiting-acrobat-reader-zero-day-flaw-since-december","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/09\/hackers-exploiting-acrobat-reader-zero-day-flaw-since-december\/","title":{"rendered":"Hackers exploiting Acrobat Reader zero-day flaw since December"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2026\/04\/09\/Adobe.jpg\" width=\"1600\" alt=\"Hackers exploiting Acrobat Reader zero-day flaw since December\"><\/p>\n<p>Attackers have been exploiting a zero-day vulnerability in Adobe Reader using maliciously crafted PDF documents since at least December.<\/p>\n<p>The attacks <a href=\"https:\/\/x.com\/HaifeiLi\/status\/2041677065519607917\" target=\"_blank\" rel=\"nofollow noopener\">have been discovered<\/a> by security researcher Haifei Li (the founder of the sandbox-based exploit-detection platform EXPMON), who warned on Tuesday that the attackers are using what he described as a &#8220;highly sophisticated, fingerprinting-style PDF exploit&#8221; to target an undisclosed Adobe Reader security flaw.<\/p>\n<p>Li also said that these attacks have been targeting Adobe users for at least 4 months, stealing data from compromised systems using privileged&nbsp;util.readFileIntoStream and&nbsp;RSS.addFeed&nbsp;Acrobat APIs, and deploying additional exploits.<\/p>\n<div align=\"center\" style=\"width:98%; margin:0 auto; text-align:center; padding:4px; background:#f0f0f0; border:1px solid #ccc; border-radius:6px;\">  <a href=\"https:\/\/www.adaptivesecurity.com\/demo\/security-awareness-training?utm_source=display_network&amp;utm_medium=paid_display&amp;utm_campaign=2026_04_display_bleepingcomputer&amp;utm_id=701Rd00000fE8REIA0&amp;utm_content=970x250\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/a\/as-tour-the-platform-970-x250.jpg\" style=\"margin-top: 0px;\" alt=\"Hackers exploiting Acrobat Reader zero-day flaw since December\"><\/a> <\/div>\n<p>&#8220;This &#8216;fingerprinting&#8217; exploit has been confirmed to leverage a zero-day\/unpatched vulnerability that works on the latest version of Adobe Reader without requiring any user interaction beyond opening a PDF file,&#8221; <a href=\"http:\/\/www.linkedin.com\/feed\/update\/urn:li:activity:7447732911405142016\/\" target=\"_blank\" rel=\"nofollow noopener\">Li warned<\/a>.<\/p>\n<p>&#8220;Even more concerning, this exploit allows the threat actor to not only collect\/steal local information but also potentially launch subsequent RCE\/SBX attacks, which could lead to full control of the victim&#8217;s system.&#8221;<\/p>\n<p>Haifei Li has disclosed a long list of security vulnerabilities in Microsoft, Google, and Adobe software, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-shares-temp-fix-for-ongoing-office-365-zero-day-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">many<\/a> of <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/windows-mshtml-zero-day-used-in-malware-attacks-for-over-a-year\/\" target=\"_blank\" rel=\"nofollow noopener\">which<\/a> have <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/adobe-fixes-acrobat-reader-zero-day-with-public-poc-exploit\/\" target=\"_blank\" rel=\"nofollow noopener\">been<\/a> exploited in <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-critical-microsoft-outlook-rce-bug-is-trivial-to-exploit\/\" target=\"_blank\" rel=\"nofollow noopener\">zero-day<\/a> attacks.<\/p>\n<h2>Russian-language phishing lures<\/h2>\n<p>Threat intelligence analyst Gi7w0rm, who also analyzed this Adobe Reader exploit, <a href=\"https:\/\/x.com\/Gi7w0rm\/status\/2042003381158379554\" target=\"_blank\" rel=\"nofollow noopener\">found<\/a> that PDF documents pushed in these attacks contain Russian-language lures referencing ongoing events in the Russian oil and gas industry.<\/p>\n<p>Li has notified Adobe about these findings and, until the company releases security updates to address this actively exploited vulnerability, advised Adobe Reader users not to open PDF documents received from untrusted contacts until a patch is released.<\/p>\n<p>Network defenders can also mitigate attacks exploiting this zero-day by monitoring and blocking HTTP\/HTTPS traffic containing the &#8220;Adobe Synchronizer&#8221; string in the User-Agent header.<\/p>\n<p>&#8220;This zero-day\/unpatched capability for broad information harvesting and the potential for subsequent RCE\/SBX exploitation is enough for the security community to remain on high alert. This is why we have chosen to publish these findings immediately so users can stay vigilant,&#8221; <a href=\"https:\/\/justhaifei1.blogspot.com\/2026\/04\/expmon-detected-sophisticated-zero-day-adobe-reader.html\" target=\"_blank\" rel=\"nofollow noopener\">he added<\/a>.<\/p>\n<p>BleepingComputer also reached out to Adobe with questions about Li&#8217;s findings, but a response was not immediately available.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/p\/picus-whitepaper.jpg\" alt=\"Hackers exploiting Acrobat Reader zero-day flaw since December\">         <\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Automated Pentesting Covers Only 1 of 6 Surfaces.<\/a><\/h2>\n<p>Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.<\/p>\n<p>This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.<\/p>\n<p>           <button><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Get Your Copy Now<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/polyshell-attacks-target-56-percent-of-all-vulnerable-magento-stores\/\">PolyShell attacks target 56% of all vulnerable Magento stores<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/interlock-ransomware-exploited-secure-fmc-flaw-in-zero-day-attacks-since-january\/\">Ransomware gang exploits Cisco flaw in zero-day attacks since January<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/over-84-000-roundcube-instances-vulnerable-to-actively-exploited-flaw\/\">Over 84,000 Roundcube instances vulnerable to actively exploited flaw<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/13-year-old-bug-in-activemq-lets-hackers-remotely-execute-commands\/\">13-year-old bug in ActiveMQ lets hackers remotely execute commands<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/max-severity-flowise-rce-vulnerability-now-exploited-in-attacks\/\">Max severity Flowise RCE vulnerability now exploited in attacks<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Attackers have been exploiting a zero-day vulnerability [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-45254","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45254","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45254"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45254\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45254"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45254"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45254"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}