Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

629+ Articles
118+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Hackers Exploiting Acrobat Reader Zero-Day Flaw Since December
Hackers Exploiting Acrobat Reader Zero-Day Flaw Since December
NEWS

Hackers Exploiting Acrobat Reader Zero-Day Flaw Since December

Attackers have been silently exploiting an unpatched zero-day vulnerability in Adobe Acrobat Reader since at least November 2025, using malicious PDFs to fingerprint victims, bypass sandboxes, and exfiltrate system data — with no patch currently available.

Dylan H.

News Desk

April 9, 2026
4 min read

Security researchers have uncovered an actively exploited zero-day vulnerability in Adobe Acrobat Reader that has been weaponized in the wild since at least November 28, 2025 — over four months before the flaw was publicly identified. The exploit uses maliciously crafted PDF documents to fingerprint victim systems, bypass sandbox protections, and exfiltrate sensitive data, with no patch currently available from Adobe.

Discovery

The vulnerability was identified by Haifei Li of EXPMON, a public automated exploit analysis service, on March 26, 2026, after a suspicious PDF named yummy_adobe_exploit_uwu.pdf was submitted to the platform. Li confirmed that the exploit leverages a previously unknown logic flaw and works against the latest version of Adobe Reader with no user interaction required beyond opening the file.

Subsequent analysis identified an earlier sample — Invoice540.pdf — uploaded to VirusTotal on November 28, 2025, and a second sample on March 23, 2026, indicating the campaign had been quietly operating for months before detection.

How the Exploit Works

The attack chain exploits an unpatched logic flaw in Adobe Reader's JavaScript engine that allows untrusted PDF code to invoke privileged Acrobat APIs from within the sandboxed process — a fundamental sandbox bypass.

Attack Chain:

  1. Delivery — Victim opens a malicious PDF (social engineering implied by file naming)
  2. Obfuscation — Core exploit script is Base64-encoded and hidden within PDF objects
  3. Sandbox bypass — JavaScript engine flaw invokes privileged APIs from within sandbox
  4. Data collection — Exploits util.readFileIntoStream() to read arbitrary local files
  5. Exfiltration — Uses RSS-addFeed() API to silently transmit stolen data to attacker C2
  6. Filtering — C2 server returns empty responses to sandbox environments, delivering real payloads only to genuine victims

The data collected in the initial fingerprinting phase includes:

  • Exact operating system version and details
  • System language settings
  • Adobe Reader version number
  • Local file path of the PDF document

This fingerprinting data allows threat actors to profile targeted victims before potentially delivering more destructive follow-on payloads.

Escalation Potential

Li emphasized that the exploit's capabilities extend well beyond initial reconnaissance:

"Even more concerning, this exploit allows the threat actor to not only collect/steal local information but also potentially launch subsequent RCE/SBX attacks, which could lead to full control of the victim's system."

The multi-stage design — fingerprinting first, payload delivery second — is consistent with targeted attack operations that need to verify victim identity before deploying high-value tools that could expose the campaign if deployed broadly.

Targeting Indicators

Independent researcher Gi7w0rm found that lure documents tied to the exploit contain Russian-language content referencing current events in Russia's oil and gas sector. While this does not establish definitive attribution, it suggests the campaign is targeting a specific audience rather than conducting opportunistic mass exploitation.

The targeting profile is consistent with industrial espionage or nation-state reconnaissance operations focused on energy sector entities.

Detection Challenges

A significant concern highlighted by researchers is how poorly traditional antivirus engines are detecting this threat. Samples submitted to VirusTotal showed very low detection rates, meaning most endpoint security tools are not flagging the malicious PDFs.

This is consistent with the exploit-only nature of the attack — the payload is an exploit mechanism, not a traditional malware binary — which means signature-based detection engines struggle to classify the threat.

Patch Status

As of April 9, 2026, Adobe has not released a patch for this vulnerability. EXPMON states it has notified Adobe Security and is awaiting their response.

Until a patch is available, security teams should consider:

MitigationDescription
PDF sandbox hardeningEnsure Adobe Reader's Protected Mode / Protected View is enabled
Disable JavaScript in ReaderEdit → Preferences → JavaScript → uncheck "Enable Acrobat JavaScript"
Alternative PDF readersUse alternative PDF readers for untrusted documents
Submit suspicious PDFsUse EXPMON's public service to analyze suspect PDF files
Email gateway filteringIncrease scrutiny on PDF attachments in email security policies
EDR behavioral monitoringWatch for unusual Adobe Reader API calls and outbound network connections

Industry Implications

This vulnerability underscores a broader challenge for organizations that rely on PDFs as a core business document format: the attack surface for PDF-based exploits remains significant even with sandboxing enabled, and the dwell time of four-plus months before discovery demonstrates how advanced campaigns can remain undetected in widely-deployed enterprise software.


Source: BleepingComputer — Hackers exploiting Acrobat Reader zero-day flaw since December

#Zero-Day#Vulnerability#Adobe#Acrobat Reader#PDF#Sandbox Bypass#BleepingComputer

Related Articles

Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025

Threat actors have been exploiting an unpatched zero-day in Adobe Reader since at least November 2025, using specially crafted PDFs to fingerprint victims via JavaScript API abuse, bypass sandbox protections, and exfiltrate data — with Russian oil and gas sector lures suggesting targeted espionage objectives.

5 min read

Google Fixes Fourth Chrome Zero-Day Exploited in Attacks in 2026

Google has patched the fourth Chrome zero-day vulnerability actively exploited in attacks this year, a use-after-free flaw in the Dawn graphics engine...

4 min read

Hackers Exploit TrueConf Zero-Day to Push Malicious Software Updates

Threat actors have weaponized an unpatched zero-day in TrueConf conference server software to execute arbitrary files on all connected endpoints,...

4 min read
Back to all News