![]() Initially we thought that it's JAOP (Just Another Obfuscated PDF), which it, at the bottom line, is, but it turned out to be much more. We already posted several diaries about such malicious PDF documents last week – see my diary at or Daniel's static analysis diaries at and (with some of Daniel's great perl fu).Ĭouple of days ago we received another malicious PDF from our reader Richard. Judging by attack dates posted by Google (middle of December), it was maybe even the very latest vulnerability. ![]() ![]() It appears that the initial attack vector on Google (and 20+ other companies!) was probably a malicious PDF document. Adobe finally patched the last outstanding vulnerability yesterday (although the automatic installation process on my laptop horribly failed) and on the same day we had a very concerning announcement by Google. I'm pretty sure that some of our readers had enough of malicious PDF for last couple of weeks.
0 Comments
Leave a Reply. |