{"id":45274,"date":"2026-04-10T01:22:29","date_gmt":"2026-04-09T17:22:29","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/10\/adobe-reader-zero-day-exploited-to-steal-data-via-malicious-pdfs\/"},"modified":"2026-04-10T01:22:29","modified_gmt":"2026-04-09T17:22:29","slug":"adobe-reader-zero-day-exploited-to-steal-data-via-malicious-pdfs","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/10\/adobe-reader-zero-day-exploited-to-steal-data-via-malicious-pdfs\/","title":{"rendered":"Adobe Reader Zero-Day Exploited to Steal Data via Malicious PDFs"},"content":{"rendered":"\n<p>Hackers have been exploiting an as-yet unidentified flaw in Adobe Reader since at least November 2025. This zero-day vulnerability was first discovered by security expert Haifei Li, founder of EXPMON, a sandbox-based exploit detection system.<\/p>\n<h3><strong>How the attack works<\/strong><\/h3>\n<p>Haifei Li found that the attack is triggered as soon as a victim opens a specially crafted PDF file. One <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/www.virustotal.com\/gui\/file\/54077a5b15638e354fa02318623775b7a1cc0e8c21e59bcbab333035369e377f\">sample<\/a> identified on VirusTotal was named \u201c<code>Invoice540.pdf<\/code>,\u201d suggesting the attackers are using fake invoices as a lure. Li notes that the exploit is particularly dangerous because it runs on the latest version of Adobe Reader without requiring any additional user interaction.<\/p>\n<div>\n<figure><a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Active-0-day-flaw-in-Adobe-Reader-exploited-to-steal-data-since-2025.png\"><img loading=\"lazy\" decoding=\"async\" width=\"638\" height=\"318\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Active-0-day-flaw-in-Adobe-Reader-exploited-to-steal-data-since-2025.png\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Active-0-day-flaw-in-Adobe-Reader-exploited-to-steal-data-since-2025.png 638w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Active-0-day-flaw-in-Adobe-Reader-exploited-to-steal-data-since-2025-300x150.png 300w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Active-0-day-flaw-in-Adobe-Reader-exploited-to-steal-data-since-2025-380x189.png 380w\" sizes=\"auto, (max-width: 638px) 100vw, 638px\" alt=\"Adobe Reader Zero-Day Exploited to Steal Data via Malicious PDFs\" \/><\/a><figcaption>Detected Sample (Source: Haifei Li)<\/figcaption><\/figure>\n<\/p><\/div>\n<p>Once the file is open, it runs hidden, heavily obfuscated JavaScript code. This code hijacks two built-in software tools called <code>APIs: util.readFileIntoStream<\/code>, which is normally used to handle files, and RSS.addFeed, which usually manages web updates. By abusing these, the hackers can secretly steal data from the computer and send it to a remote server at the address <code>169.40.2.68<\/code>.<\/p>\n<p>Li further explained in a <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/justhaifei1.blogspot.com\/2026\/04\/expmon-detected-sophisticated-zero-day-adobe-reader.html\">blog post<\/a> that this is just the first step because by collecting info and fingerprinting the computer, hackers can prepare for even worse actions. This includes <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/imagemagick-zero-day-rce-linux-wordpress-servers\/\">Remote Code Execution<\/a> (RCE), which lets them run their own programmes on the victim&#8217;s machine, or a Sandbox Escape (SBX) to bypass built-in security barriers and take full control.<\/p>\n<figure>\n<div>\n<blockquote data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Dear security community\/researchers, I&#39;d really like to call to look at this <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/t.co\/BuvZtpBChe\">https:\/\/t.co\/BuvZtpBChe<\/a>, this information shows that the threat actors behind this Adobe Reader 0day attack was not just collecting local information but was really delivering additional exploits, need\u2026<\/p>\n<p>&mdash; Haifei Li (@HaifeiLi) <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/twitter.com\/HaifeiLi\/status\/2041967201918599664?ref_src=twsrc%5Etfw\">April 8, 2026<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script> <\/div>\n<\/figure>\n<h3><strong>Russian oil and gas lures<\/strong><\/h3>\n<p>The attackers seem to be focused on targeting specific groups. A security analyst, Giuseppe Massaro (Gi7w0rm), looked into the malicious documents, identifying that they were written in Russian and that the text in the PDFs talks about news and events in the Russian oil and gas industry to make the emails look real.<\/p>\n<figure>\n<div>\n<blockquote data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Apparent <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/twitter.com\/hashtag\/0day?src=hash&amp;ref_src=twsrc%5Etfw\">#0day<\/a> in Adobe Reader has been observed in the wild. Seems to exploit part of Adobe Readers JavaScript engine. Documents observed contain Russian language lures and refer to issues regarding current events related to the oil and gas industry in Russia. <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/t.co\/QRu63fuAP4\">https:\/\/t.co\/QRu63fuAP4<\/a><\/p>\n<p>&mdash; Gi7w0rm (@Gi7w0rm) <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/twitter.com\/Gi7w0rm\/status\/2042003381158379554?ref_src=twsrc%5Etfw\">April 8, 2026<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script> <\/div>\n<\/figure>\n<p>More concerning is that this is not the first time Adobe Reader has faced similar issues. A previous flaw, tracked as <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2024-41869\">CVE-2024-41869<\/a>, was also reported by Haifei Li, although Adobe did not confirm whether it had been exploited in real-world attacks at the time.<\/p>\n<p>Adobe was notified about the flaw around 7 April, but they have not released an update to fix it just yet. Li, who has a long history of finding bugs at companies like <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-40444\">Microsoft<\/a>, said it is vital for the public to know about this now so they can stay safe.<\/p>\n<p>Since there isn&#8217;t any official fix or patch available as yet, be <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/malware-via-macro-pdf-word-document\/\" data-type=\"post\" data-id=\"26050\">careful when opening any PDF files<\/a> from people you don\u2019t know, and those who manage office networks must block internet traffic that mentions Adobe Synchronizer in the header to stop the hackers from communicating with the infected computers.<\/p>\n<div style='margin: 8px auto; text-align: center; display: block; clear: both;'> <script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-3675825324474978\"      crossorigin=\"anonymous\"><\/script>  <ins      style=\"display:inline-block;width:300px;height:250px\"      data-ad-client=\"ca-pub-3675825324474978\"      data-ad-slot=\"3421156210\"><\/ins> <script>      (adsbygoogle = window.adsbygoogle || []).push({}); <\/script><\/div>\n<div >\n<div>\n<div>\n<div>\n<h5> \t\t\t\t\t\t<a target=\"_blank\" rel=\"author\" href=\"https:\/\/hackread.com\/author\/deeba\/\"> \t\t\t\t\t\t\tDeeba Ahmed\t\t\t\t\t\t<\/a> \t\t\t\t\t<\/h5>\n<div> \t\t\t\t\t\t\t<a target=\"_blank\" rel=\"author\" href=\"https:\/\/hackread.com\/author\/deeba\/\"> \t\t\t\t\t\t\t\t<img src='https:\/\/secure.gravatar.com\/avatar\/9fefbe13a37a8aeb4620dfe89bb7feabd9433643ff382b6b882f27837a4cfb72?s=80&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/9fefbe13a37a8aeb4620dfe89bb7feabd9433643ff382b6b882f27837a4cfb72?s=160&#038;d=mm&#038;r=g 2x' height='80' width='80' alt=\"Adobe Reader Zero-Day Exploited to Steal Data via Malicious PDFs\" \/>\t\t\t\t\t\t\t<\/a> \t\t\t\t\t\t<\/div>\n<div>\n<div> \t\t\t\t\t\t\t\tDeeba is a veteran cybersecurity reporter at Hackread.com with over a decade of experience covering cybercrime, vulnerabilities, and security events. Her expertise and in-depth analysis make her a key contributor to the platform\u2019s trusted coverage.\t\t\t\t\t\t\t<\/div>\n<div>\n<div> \t\t<a href=\"https:\/\/hackread.com\/author\/deeba\/\" target=\"\"> \t\t\tView Posts\t\t<\/a> \t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Hackers have been exploiting an as-yet unidentified fla [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-45274","post","type-post","status-publish","format-standard","hentry","category-hackread"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45274","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45274"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45274\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}