![]() Push-button exploits: In reality, as malware kits that exploited PDF vulnerabilities became readily available, little effort or expense was actually needed to tap this opportunity.This enormous pool of potential victims translates into a financially lucrative attack target worthy of investment in malware development. Just about every desktop has a PDF reader installed - usually Adobe Reader or Acrobat. Malware writers searching for more fertile fields seized upon PDF as a wildly popular monoculture ripe for attack. According to Kaspersky researcher Roul Schouwenberg, hardening techniques like Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) had been rolled into Windows, making OS exploits less attractive. Low-hanging fruit: One of the biggest reasons that PDF exploits blossomed in 2009 was Adobe Reader’s ubiquity.Why do malware writers love to exploit PDF and how you can avoid becoming a casualty of this on-going arms race? However, PDF remains the world’s second most popular target.įor those running PDF software – lead by Adobe Reader and its commercial counterpart Acrobat – these attacks have triggered a seemingly nonstop stream of updates. By mid-year, PDF exploits had fallen to 30 percent, overtaken by Java. In early 2010, PDF exploits were by far the most common malware tactic, representing more than 47 percent of all Q1 infections tracked by Kaspersky Labs. We may make money when you click on links to our partners. ESecurityPlanet content and product recommendations are editorially independent.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |