Feeds

Poison PDF pusher released to public

A quick download, a couple of clicks, a naughty URL and you're in the business of crime

Internet Security Threat Report 2014

Attacking enterprises just got easier with the development of an idiot-friendly tool that spits out booby-trapped PDFs with a few clicks.

The tool weaves existing exploits into PDFs, allowing attacks against Adobe Reader and Acrobat versions 8.x prior to 8.2.1 and 9.x before 9.3.1.

Users can insert their own URL pointers into the program, which then spits out an exploited PDF. Microsoft's free anti-virus had blocked the attack (CVE-2010-0188) in a test and it was likely other platforms would raise flags too.

Only unpatched users could be effectively targeted, but given the poor state of patching, that provides a pretty big pool of potential victims.

Users could combine the tool with one of many free or paid automated phishing platforms to create the ultimate lazy targeted attack system.

While the black hat uses for the tool were obvious, penetration testers and internal security teams can use it to launch attacks against staff to help improve social engineering awareness and defences.

SecRecon freelance security bod Claes Spett developed the tool while building a private exploit kit to help him pop organisations during penetration tests.

He published the executable to Google Drive, with the usual "at your own risk" caveat, here. El Reg urges users to play responsibly. ®

Internet Security Threat Report 2014

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.