Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. There is at least one Adobe Reader 0day being exploited in the wild:https://justhaifei1.blogspot.com/2026/04/expmon-detected-sophisticated-zero-day-adobe-reader.html

There is at least one Adobe Reader 0day being exploited in the wild:https://justhaifei1.blogspot.com/2026/04/expmon-detected-sophisticated-zero-day-adobe-reader.html

Scheduled Pinned Locked Moved Uncategorized
18 Posts 5 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • wdormann@infosec.exchangeW wdormann@infosec.exchange

    There is at least one Adobe Reader 0day being exploited in the wild:
    https://justhaifei1.blogspot.com/2026/04/expmon-detected-sophisticated-zero-day-adobe-reader.html

    TL;DR: One 0day is being used to simply communicate details to a C2 server to get further commands. Specifically, there is a vulnerability that allows reading arbitrary local files using Reader JavaScript. In this case, ntdll.dll and friends, so that the C2 knows specifically what version of Windows the victim is running.

    Nobody knows what secondary payload the C2 is delivering to selected targets. But it's a direct pipeline to allow the C2 to run arbitrary JavaScript on the victim system.

    So I'll bet dollars to donuts that there is a second more powerful vulnerability that the attackers have up their sleeves. Or at the very least, the same vulnerability that allows the privileged file read might be able to be leveraged to do something nasty. And the whole AES-encrypted C2 stuff is merely to not put the payload statically in the exploit PDF, allowing a dynamic payload for any given target.

    wdormann@infosec.exchangeW This user is from outside of this forum
    wdormann@infosec.exchangeW This user is from outside of this forum
    wdormann@infosec.exchange
    wrote last edited by
    #2

    The interesting thing about using ntdll.dll as the target for this first vulnerability is that in normal Reader operation, ntdll.dll is accessed.

    So there's no immediate obvious symptom of shenanigans. Other than the fact that a C2 server is polled for further instructions that is. πŸ˜‚

    wdormann@infosec.exchangeW 1 Reply Last reply
    0
    • wdormann@infosec.exchangeW wdormann@infosec.exchange

      The interesting thing about using ntdll.dll as the target for this first vulnerability is that in normal Reader operation, ntdll.dll is accessed.

      So there's no immediate obvious symptom of shenanigans. Other than the fact that a C2 server is polled for further instructions that is. πŸ˜‚

      wdormann@infosec.exchangeW This user is from outside of this forum
      wdormann@infosec.exchangeW This user is from outside of this forum
      wdormann@infosec.exchange
      wrote last edited by
      #3

      Over on the Bad Site is a bit of analysis

      The million dollar question is: Is this vulnerability chain, which is honestly used just to provide useful information to the C2 just the warm-up to the real exploit delivered by the C2?

      Or is privileged JavaScript execution enough to do bad things?

      wdormann@infosec.exchangeW 1 Reply Last reply
      0
      • wdormann@infosec.exchangeW wdormann@infosec.exchange

        There is at least one Adobe Reader 0day being exploited in the wild:
        https://justhaifei1.blogspot.com/2026/04/expmon-detected-sophisticated-zero-day-adobe-reader.html

        TL;DR: One 0day is being used to simply communicate details to a C2 server to get further commands. Specifically, there is a vulnerability that allows reading arbitrary local files using Reader JavaScript. In this case, ntdll.dll and friends, so that the C2 knows specifically what version of Windows the victim is running.

        Nobody knows what secondary payload the C2 is delivering to selected targets. But it's a direct pipeline to allow the C2 to run arbitrary JavaScript on the victim system.

        So I'll bet dollars to donuts that there is a second more powerful vulnerability that the attackers have up their sleeves. Or at the very least, the same vulnerability that allows the privileged file read might be able to be leveraged to do something nasty. And the whole AES-encrypted C2 stuff is merely to not put the payload statically in the exploit PDF, allowing a dynamic payload for any given target.

        davemwilburn@infosec.exchangeD This user is from outside of this forum
        davemwilburn@infosec.exchangeD This user is from outside of this forum
        davemwilburn@infosec.exchange
        wrote last edited by
        #4

        @wdormann

        0-day in acroread.exe? Are we back in the early twenty teens again?

        wdormann@infosec.exchangeW 1 Reply Last reply
        0
        • davemwilburn@infosec.exchangeD davemwilburn@infosec.exchange

          @wdormann

          0-day in acroread.exe? Are we back in the early twenty teens again?

          wdormann@infosec.exchangeW This user is from outside of this forum
          wdormann@infosec.exchangeW This user is from outside of this forum
          wdormann@infosec.exchange
          wrote last edited by
          #5

          @DaveMWilburn
          What makes a PDF reader better than its competition is the number of features that it foists upon you, obviously.

          1 Reply Last reply
          0
          • wdormann@infosec.exchangeW wdormann@infosec.exchange

            Over on the Bad Site is a bit of analysis

            The million dollar question is: Is this vulnerability chain, which is honestly used just to provide useful information to the C2 just the warm-up to the real exploit delivered by the C2?

            Or is privileged JavaScript execution enough to do bad things?

            wdormann@infosec.exchangeW This user is from outside of this forum
            wdormann@infosec.exchangeW This user is from outside of this forum
            wdormann@infosec.exchange
            wrote last edited by
            #6

            As I was looking into this (specifically the readFileIntoStream() part), I was quite disappointed by where ChatGPT would refuse to go further. Because I'm apparently a criminal and all. The irony here being that I already provided to ChatGPT the JavaScript that performs the exploit. Albeit in a form that isn't readable by humans. As such, ChatGPT's refusal to proceed only helps the miscreants already performing attacks.

            Compared to Grok, which just did what I asked.

            I'm not particularly fond of receiving ethical judgment and assumptions about why I'm doing my job

            Link Preview ImageLink Preview ImageLink Preview Image
            wdormann@infosec.exchangeW 1 Reply Last reply
            0
            • wdormann@infosec.exchangeW wdormann@infosec.exchange

              There is at least one Adobe Reader 0day being exploited in the wild:
              https://justhaifei1.blogspot.com/2026/04/expmon-detected-sophisticated-zero-day-adobe-reader.html

              TL;DR: One 0day is being used to simply communicate details to a C2 server to get further commands. Specifically, there is a vulnerability that allows reading arbitrary local files using Reader JavaScript. In this case, ntdll.dll and friends, so that the C2 knows specifically what version of Windows the victim is running.

              Nobody knows what secondary payload the C2 is delivering to selected targets. But it's a direct pipeline to allow the C2 to run arbitrary JavaScript on the victim system.

              So I'll bet dollars to donuts that there is a second more powerful vulnerability that the attackers have up their sleeves. Or at the very least, the same vulnerability that allows the privileged file read might be able to be leveraged to do something nasty. And the whole AES-encrypted C2 stuff is merely to not put the payload statically in the exploit PDF, allowing a dynamic payload for any given target.

              C This user is from outside of this forum
              C This user is from outside of this forum
              chris_vonw@infosec.exchange
              wrote last edited by
              #7

              @wdormann does the exploit still work with JavaScript disabled in Acrobat?

              wdormann@infosec.exchangeW 1 Reply Last reply
              0
              • C chris_vonw@infosec.exchange

                @wdormann does the exploit still work with JavaScript disabled in Acrobat?

                wdormann@infosec.exchangeW This user is from outside of this forum
                wdormann@infosec.exchangeW This user is from outside of this forum
                wdormann@infosec.exchange
                wrote last edited by
                #8

                @Chris_vonW
                No, if JavaScript isn't enabled, the exploit doesn't do a thing.

                1 Reply Last reply
                0
                • wdormann@infosec.exchangeW wdormann@infosec.exchange

                  As I was looking into this (specifically the readFileIntoStream() part), I was quite disappointed by where ChatGPT would refuse to go further. Because I'm apparently a criminal and all. The irony here being that I already provided to ChatGPT the JavaScript that performs the exploit. Albeit in a form that isn't readable by humans. As such, ChatGPT's refusal to proceed only helps the miscreants already performing attacks.

                  Compared to Grok, which just did what I asked.

                  I'm not particularly fond of receiving ethical judgment and assumptions about why I'm doing my job

                  Link Preview ImageLink Preview ImageLink Preview Image
                  wdormann@infosec.exchangeW This user is from outside of this forum
                  wdormann@infosec.exchangeW This user is from outside of this forum
                  wdormann@infosec.exchange
                  wrote last edited by
                  #9

                  But I suppose I'll also note: What Grok provided to me was completely made up, including a nonsensical call to Collab.collectEmailInfo(). But to those not paying attention, it seemed plausible.

                  Which had a buffer overflow in CVE-2007-5659.

                  Strange days indeed.

                  wdormann@infosec.exchangeW 1 Reply Last reply
                  0
                  • wdormann@infosec.exchangeW wdormann@infosec.exchange

                    There is at least one Adobe Reader 0day being exploited in the wild:
                    https://justhaifei1.blogspot.com/2026/04/expmon-detected-sophisticated-zero-day-adobe-reader.html

                    TL;DR: One 0day is being used to simply communicate details to a C2 server to get further commands. Specifically, there is a vulnerability that allows reading arbitrary local files using Reader JavaScript. In this case, ntdll.dll and friends, so that the C2 knows specifically what version of Windows the victim is running.

                    Nobody knows what secondary payload the C2 is delivering to selected targets. But it's a direct pipeline to allow the C2 to run arbitrary JavaScript on the victim system.

                    So I'll bet dollars to donuts that there is a second more powerful vulnerability that the attackers have up their sleeves. Or at the very least, the same vulnerability that allows the privileged file read might be able to be leveraged to do something nasty. And the whole AES-encrypted C2 stuff is merely to not put the payload statically in the exploit PDF, allowing a dynamic payload for any given target.

                    waldi@chaos.socialW This user is from outside of this forum
                    waldi@chaos.socialW This user is from outside of this forum
                    waldi@chaos.social
                    wrote last edited by
                    #10

                    @wdormann Why the heck can JavaScript in Adobe crap read stuff outside the document at all? And connect to random cross-origin destinations? This is Microsoft Office scripting all over again.

                    wdormann@infosec.exchangeW 1 Reply Last reply
                    0
                    • wdormann@infosec.exchangeW wdormann@infosec.exchange

                      But I suppose I'll also note: What Grok provided to me was completely made up, including a nonsensical call to Collab.collectEmailInfo(). But to those not paying attention, it seemed plausible.

                      Which had a buffer overflow in CVE-2007-5659.

                      Strange days indeed.

                      wdormann@infosec.exchangeW This user is from outside of this forum
                      wdormann@infosec.exchangeW This user is from outside of this forum
                      wdormann@infosec.exchange
                      wrote last edited by
                      #11

                      And just for anybody playing along, again from the Bad Site, a link to a properly (functional) deobfuscated JavaScript has been shared.

                      And yeah, this part of the exploit allows for reading of arbitrary files.

                      Now, whatever threat actor at play here was fine with buffoons such as myself getting access to this part of the exploit chain. As it was only used to communicate precise details to the C2 server. i.e., this exploit chain was the disposable part.

                      I can only imagine what sort of second-stage exploit is being served up AES-encrypted to only some individuals. πŸ€”

                      Now, even without a fancy second stage, I suspect the ability to exfiltrate arbitrary files off of a system opening the PDF ain't nothing to sneeze at.

                      Link Preview ImageLink Preview Image
                      fellows@cyberplace.socialF wdormann@infosec.exchangeW 2 Replies Last reply
                      1
                      0
                      • R relay@relay.infosec.exchange shared this topic
                      • wdormann@infosec.exchangeW wdormann@infosec.exchange

                        And just for anybody playing along, again from the Bad Site, a link to a properly (functional) deobfuscated JavaScript has been shared.

                        And yeah, this part of the exploit allows for reading of arbitrary files.

                        Now, whatever threat actor at play here was fine with buffoons such as myself getting access to this part of the exploit chain. As it was only used to communicate precise details to the C2 server. i.e., this exploit chain was the disposable part.

                        I can only imagine what sort of second-stage exploit is being served up AES-encrypted to only some individuals. πŸ€”

                        Now, even without a fancy second stage, I suspect the ability to exfiltrate arbitrary files off of a system opening the PDF ain't nothing to sneeze at.

                        Link Preview ImageLink Preview Image
                        fellows@cyberplace.socialF This user is from outside of this forum
                        fellows@cyberplace.socialF This user is from outside of this forum
                        fellows@cyberplace.social
                        wrote last edited by
                        #12

                        @wdormann if the malicious PDF were blown up in a sandbox, would its activity be detected as abnormal?

                        wdormann@infosec.exchangeW 1 Reply Last reply
                        0
                        • fellows@cyberplace.socialF fellows@cyberplace.social

                          @wdormann if the malicious PDF were blown up in a sandbox, would its activity be detected as abnormal?

                          wdormann@infosec.exchangeW This user is from outside of this forum
                          wdormann@infosec.exchangeW This user is from outside of this forum
                          wdormann@infosec.exchange
                          wrote last edited by
                          #13

                          @fellows
                          Depends on the sandbox, I suppose.
                          The vulnerability being exploited merely reads files like ntdll.dll to get version infromation. But the subsequent polling of a remote C2 host is a touch out of the ordinary. At least to me.

                          1 Reply Last reply
                          0
                          • waldi@chaos.socialW waldi@chaos.social

                            @wdormann Why the heck can JavaScript in Adobe crap read stuff outside the document at all? And connect to random cross-origin destinations? This is Microsoft Office scripting all over again.

                            wdormann@infosec.exchangeW This user is from outside of this forum
                            wdormann@infosec.exchangeW This user is from outside of this forum
                            wdormann@infosec.exchange
                            wrote last edited by
                            #14

                            @waldi
                            Well, that's the vulnerability. πŸ˜‚

                            waldi@chaos.socialW 1 Reply Last reply
                            0
                            • wdormann@infosec.exchangeW wdormann@infosec.exchange

                              @waldi
                              Well, that's the vulnerability. πŸ˜‚

                              waldi@chaos.socialW This user is from outside of this forum
                              waldi@chaos.socialW This user is from outside of this forum
                              waldi@chaos.social
                              wrote last edited by
                              #15

                              @wdormann No, it is a documented feature: https://opensource.adobe.com/dc-acrobat-sdk-docs/library/jsapiref/JS_API_AcroJSChanges.html#new-util-method

                              wdormann@infosec.exchangeW 1 Reply Last reply
                              0
                              • waldi@chaos.socialW waldi@chaos.social

                                @wdormann No, it is a documented feature: https://opensource.adobe.com/dc-acrobat-sdk-docs/library/jsapiref/JS_API_AcroJSChanges.html#new-util-method

                                wdormann@infosec.exchangeW This user is from outside of this forum
                                wdormann@infosec.exchangeW This user is from outside of this forum
                                wdormann@infosec.exchange
                                wrote last edited by
                                #16

                                @waldi
                                But it's a privileged function.
                                The vulnerability at play here is that normal JavaScript in a PDF is able to call privileged functions.

                                1 Reply Last reply
                                0
                                • wdormann@infosec.exchangeW wdormann@infosec.exchange

                                  And just for anybody playing along, again from the Bad Site, a link to a properly (functional) deobfuscated JavaScript has been shared.

                                  And yeah, this part of the exploit allows for reading of arbitrary files.

                                  Now, whatever threat actor at play here was fine with buffoons such as myself getting access to this part of the exploit chain. As it was only used to communicate precise details to the C2 server. i.e., this exploit chain was the disposable part.

                                  I can only imagine what sort of second-stage exploit is being served up AES-encrypted to only some individuals. πŸ€”

                                  Now, even without a fancy second stage, I suspect the ability to exfiltrate arbitrary files off of a system opening the PDF ain't nothing to sneeze at.

                                  Link Preview ImageLink Preview Image
                                  wdormann@infosec.exchangeW This user is from outside of this forum
                                  wdormann@infosec.exchangeW This user is from outside of this forum
                                  wdormann@infosec.exchange
                                  wrote last edited by
                                  #17

                                  For the record, what got the JavaScript deobfuscated was:
                                  https://webcrack.netlify.app/

                                  There's also:
                                  https://obf-io.deobfuscate.io/

                                  It sure is better to run an app to do things than to even attempt to believe the nonsense that AI tools spew out. πŸ˜‚

                                  wdormann@infosec.exchangeW 1 Reply Last reply
                                  0
                                  • wdormann@infosec.exchangeW wdormann@infosec.exchange

                                    For the record, what got the JavaScript deobfuscated was:
                                    https://webcrack.netlify.app/

                                    There's also:
                                    https://obf-io.deobfuscate.io/

                                    It sure is better to run an app to do things than to even attempt to believe the nonsense that AI tools spew out. πŸ˜‚

                                    wdormann@infosec.exchangeW This user is from outside of this forum
                                    wdormann@infosec.exchangeW This user is from outside of this forum
                                    wdormann@infosec.exchange
                                    wrote last edited by
                                    #18

                                    This is now fixed as CVE-2026-34621.

                                    Interestingly, it's a single CVE that is described as RCE. So presumably the same vulnerability that allowed for the reading of arbitrary files also is what enabled RCE.

                                    Which suggests that somebody at Adobe did see what the second stage looked like. Or was able logically draw the conclusion that the same vulnerability (used in a different way) could be leveraged for RCE. πŸ€”

                                    1 Reply Last reply
                                    1
                                    0
                                    Reply
                                    • Reply as topic
                                    Log in to reply
                                    • Oldest to Newest
                                    • Newest to Oldest
                                    • Most Votes


                                    • Login

                                    • Login or register to search.
                                    • First post
                                      Last post
                                    0
                                    • Categories
                                    • Recent
                                    • Tags
                                    • Popular
                                    • World
                                    • Users
                                    • Groups