<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[There is at least one Adobe Reader 0day being exploited in the wild:https:&#x2F;&#x2F;justhaifei1.blogspot.com&#x2F;2026&#x2F;04&#x2F;expmon-detected-sophisticated-zero-day-adobe-reader.html]]></title><description><![CDATA[<p>There is at least one Adobe Reader 0day being exploited in the wild:<br /><a href="https://justhaifei1.blogspot.com/2026/04/expmon-detected-sophisticated-zero-day-adobe-reader.html" rel="nofollow noopener"><span>https://</span><span>justhaifei1.blogspot.com/2026/</span><span>04/expmon-detected-sophisticated-zero-day-adobe-reader.html</span></a></p><p>TL;DR: One 0day is being used to simply communicate details to a C2 server to get further commands. Specifically, there is a vulnerability that allows reading arbitrary local files using Reader JavaScript. In this case, ntdll.dll and friends, so that the C2 knows specifically what version of Windows the victim is running.</p><p>Nobody knows what secondary payload the C2 is delivering to selected targets. But it's a direct pipeline to allow the C2 to run arbitrary JavaScript on the victim system.</p><p>So I'll bet dollars to donuts that there is a <strong>second</strong> more powerful vulnerability that the attackers have up their sleeves. Or at the very least, the same vulnerability that allows the privileged file read might be able to be leveraged to do something nasty. And the whole AES-encrypted C2 stuff is merely to not put the payload statically in the exploit PDF, allowing a dynamic payload for any given target.</p>]]></description><link>https://board.circlewithadot.net/topic/3e36b403-880c-478b-bfdf-f4a05c84046c/there-is-at-least-one-adobe-reader-0day-being-exploited-in-the-wild-https-justhaifei1.blogspot.com-2026-04-expmon-detected-sophisticated-zero-day-adobe-reader.html</link><generator>RSS for Node</generator><lastBuildDate>Thu, 16 Apr 2026 01:26:05 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/3e36b403-880c-478b-bfdf-f4a05c84046c.rss" rel="self" type="application/rss+xml"/><pubDate>Thu, 09 Apr 2026 22:03:47 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to There is at least one Adobe Reader 0day being exploited in the wild:https:&#x2F;&#x2F;justhaifei1.blogspot.com&#x2F;2026&#x2F;04&#x2F;expmon-detected-sophisticated-zero-day-adobe-reader.html on Sat, 11 Apr 2026 13:48:03 GMT]]></title><description><![CDATA[<p>This is now <a href="https://helpx.adobe.com/security/products/acrobat/apsb26-43.html" rel="nofollow noopener">fixed as CVE-2026-34621</a>.</p><p>Interestingly, it's a single CVE that is described as RCE. So presumably the same vulnerability that allowed for the reading of arbitrary files also is what enabled RCE.</p><p>Which suggests that somebody at Adobe did see what the second stage looked like. Or was able logically draw the conclusion that the same vulnerability (used in a different way) could be leveraged for RCE.  <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f914.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--thinking_face" style="height:23px;width:auto;vertical-align:middle" title="🤔" alt="🤔" /></p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116386384011725134</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116386384011725134</guid><dc:creator><![CDATA[wdormann@infosec.exchange]]></dc:creator><pubDate>Sat, 11 Apr 2026 13:48:03 GMT</pubDate></item><item><title><![CDATA[Reply to There is at least one Adobe Reader 0day being exploited in the wild:https:&#x2F;&#x2F;justhaifei1.blogspot.com&#x2F;2026&#x2F;04&#x2F;expmon-detected-sophisticated-zero-day-adobe-reader.html on Fri, 10 Apr 2026 19:19:08 GMT]]></title><description><![CDATA[<p>For the record, what got the JavaScript deobfuscated was:<br /><a href="https://webcrack.netlify.app/" rel="nofollow noopener"><span>https://</span><span>webcrack.netlify.app/</span><span></span></a></p><p>There's also:<br /><a href="https://obf-io.deobfuscate.io/" rel="nofollow noopener"><span>https://</span><span>obf-io.deobfuscate.io/</span><span></span></a></p><p>It sure is better to run an app to do things than to even attempt to believe the nonsense that AI tools spew out.  <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f602.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--joy" style="height:23px;width:auto;vertical-align:middle" title="😂" alt="😂" /></p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116382023588119759</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116382023588119759</guid><dc:creator><![CDATA[wdormann@infosec.exchange]]></dc:creator><pubDate>Fri, 10 Apr 2026 19:19:08 GMT</pubDate></item><item><title><![CDATA[Reply to There is at least one Adobe Reader 0day being exploited in the wild:https:&#x2F;&#x2F;justhaifei1.blogspot.com&#x2F;2026&#x2F;04&#x2F;expmon-detected-sophisticated-zero-day-adobe-reader.html on Fri, 10 Apr 2026 18:16:42 GMT]]></title><description><![CDATA[<p><span><a href="/user/waldi%40chaos.social" rel="nofollow noopener">@<span>waldi</span></a></span> <br />But it's a privileged function.<br />The vulnerability at play here is that normal JavaScript in a PDF is able to call privileged functions.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116381778095359054</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116381778095359054</guid><dc:creator><![CDATA[wdormann@infosec.exchange]]></dc:creator><pubDate>Fri, 10 Apr 2026 18:16:42 GMT</pubDate></item><item><title><![CDATA[Reply to There is at least one Adobe Reader 0day being exploited in the wild:https:&#x2F;&#x2F;justhaifei1.blogspot.com&#x2F;2026&#x2F;04&#x2F;expmon-detected-sophisticated-zero-day-adobe-reader.html on Fri, 10 Apr 2026 18:07:20 GMT]]></title><description><![CDATA[<p><span><a href="/user/wdormann%40infosec.exchange">@<span>wdormann</span></a></span> No, it is a documented feature: <a href="https://opensource.adobe.com/dc-acrobat-sdk-docs/library/jsapiref/JS_API_AcroJSChanges.html#new-util-method" rel="nofollow noopener"><span>https://</span><span>opensource.adobe.com/dc-acroba</span><span>t-sdk-docs/library/jsapiref/JS_API_AcroJSChanges.html#new-util-method</span></a></p>]]></description><link>https://board.circlewithadot.net/post/https://chaos.social/users/waldi/statuses/116381741269982818</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://chaos.social/users/waldi/statuses/116381741269982818</guid><dc:creator><![CDATA[waldi@chaos.social]]></dc:creator><pubDate>Fri, 10 Apr 2026 18:07:20 GMT</pubDate></item><item><title><![CDATA[Reply to There is at least one Adobe Reader 0day being exploited in the wild:https:&#x2F;&#x2F;justhaifei1.blogspot.com&#x2F;2026&#x2F;04&#x2F;expmon-detected-sophisticated-zero-day-adobe-reader.html on Fri, 10 Apr 2026 18:04:20 GMT]]></title><description><![CDATA[<p><span><a href="/user/waldi%40chaos.social" rel="nofollow noopener">@<span>waldi</span></a></span> <br />Well, that's the vulnerability.  <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f602.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--joy" style="height:23px;width:auto;vertical-align:middle" title="😂" alt="😂" /></p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116381729462339185</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116381729462339185</guid><dc:creator><![CDATA[wdormann@infosec.exchange]]></dc:creator><pubDate>Fri, 10 Apr 2026 18:04:20 GMT</pubDate></item><item><title><![CDATA[Reply to There is at least one Adobe Reader 0day being exploited in the wild:https:&#x2F;&#x2F;justhaifei1.blogspot.com&#x2F;2026&#x2F;04&#x2F;expmon-detected-sophisticated-zero-day-adobe-reader.html on Fri, 10 Apr 2026 17:59:56 GMT]]></title><description><![CDATA[<p><span><a href="/user/fellows%40cyberplace.social" rel="nofollow noopener">@<span>fellows</span></a></span> <br />Depends on the sandbox, I suppose.<br />The vulnerability being exploited merely reads files like <code>ntdll.dll</code> to get version infromation.  But the subsequent polling of a remote C2 host is a touch out of the ordinary.  At least to me.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116381712187084924</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116381712187084924</guid><dc:creator><![CDATA[wdormann@infosec.exchange]]></dc:creator><pubDate>Fri, 10 Apr 2026 17:59:56 GMT</pubDate></item><item><title><![CDATA[Reply to There is at least one Adobe Reader 0day being exploited in the wild:https:&#x2F;&#x2F;justhaifei1.blogspot.com&#x2F;2026&#x2F;04&#x2F;expmon-detected-sophisticated-zero-day-adobe-reader.html on Fri, 10 Apr 2026 17:56:54 GMT]]></title><description><![CDATA[<p><span><a href="/user/wdormann%40infosec.exchange">@<span>wdormann</span></a></span> if the malicious PDF were blown up in a sandbox, would its activity be detected as abnormal?</p>]]></description><link>https://board.circlewithadot.net/post/https://cyberplace.social/users/fellows/statuses/116381700196982259</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://cyberplace.social/users/fellows/statuses/116381700196982259</guid><dc:creator><![CDATA[fellows@cyberplace.social]]></dc:creator><pubDate>Fri, 10 Apr 2026 17:56:54 GMT</pubDate></item><item><title><![CDATA[Reply to There is at least one Adobe Reader 0day being exploited in the wild:https:&#x2F;&#x2F;justhaifei1.blogspot.com&#x2F;2026&#x2F;04&#x2F;expmon-detected-sophisticated-zero-day-adobe-reader.html on Fri, 10 Apr 2026 17:24:14 GMT]]></title><description><![CDATA[<p>And just for anybody playing along, again from the Bad Site, a link to a <strong>properly</strong> (functional) deobfuscated JavaScript <a href="https://gist.github.com/Gi7w0rm/7af7899fc3c7f788b6f6b0a5bdb59c6d" rel="nofollow noopener">has been shared</a>.</p><p>And yeah, this part of the exploit allows for reading of arbitrary files.</p><p>Now, whatever threat actor at play here was fine with buffoons such as myself getting access to this part of the exploit chain.  As it was only used to communicate precise details to the C2 server.  i.e., this exploit chain was the disposable part.</p><p>I can only imagine what sort of second-stage exploit is being served up AES-encrypted to only some individuals. <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f914.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--thinking_face" style="height:23px;width:auto;vertical-align:middle" title="🤔" alt="🤔" /></p><p>Now, even without a fancy second stage, I suspect the ability to exfiltrate arbitrary files off of a system opening the PDF ain't nothing to sneeze at.</p>

<div class="row mt-3"><div class="col-12 mt-3"><img class="img-thumbnail" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/381/564/522/592/607/original/794e44a875da00ab.png" alt="Link Preview Image" /><img class="img-thumbnail" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/381/566/443/205/321/original/62b546f4daf2b2f5.png" alt="Link Preview Image" /></div></div>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116381571809065153</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116381571809065153</guid><dc:creator><![CDATA[wdormann@infosec.exchange]]></dc:creator><pubDate>Fri, 10 Apr 2026 17:24:14 GMT</pubDate></item><item><title><![CDATA[Reply to There is at least one Adobe Reader 0day being exploited in the wild:https:&#x2F;&#x2F;justhaifei1.blogspot.com&#x2F;2026&#x2F;04&#x2F;expmon-detected-sophisticated-zero-day-adobe-reader.html on Fri, 10 Apr 2026 16:06:36 GMT]]></title><description><![CDATA[<p><span><a href="/user/wdormann%40infosec.exchange">@<span>wdormann</span></a></span> Why the heck can JavaScript in Adobe crap read stuff outside the document at all? And connect to random cross-origin destinations? This is Microsoft Office scripting all over again.</p>]]></description><link>https://board.circlewithadot.net/post/https://chaos.social/users/waldi/statuses/116381266488844308</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://chaos.social/users/waldi/statuses/116381266488844308</guid><dc:creator><![CDATA[waldi@chaos.social]]></dc:creator><pubDate>Fri, 10 Apr 2026 16:06:36 GMT</pubDate></item><item><title><![CDATA[Reply to There is at least one Adobe Reader 0day being exploited in the wild:https:&#x2F;&#x2F;justhaifei1.blogspot.com&#x2F;2026&#x2F;04&#x2F;expmon-detected-sophisticated-zero-day-adobe-reader.html on Fri, 10 Apr 2026 15:32:42 GMT]]></title><description><![CDATA[<p>But I suppose I'll also note: What Grok provided to me was <strong>completely made up</strong>, including a nonsensical call to <code>Collab.collectEmailInfo()</code>.  But to those not paying attention, it seemed plausible.</p><p>Which had a buffer overflow in CVE-2007-5659.</p><p>Strange days indeed.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116381133189170354</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116381133189170354</guid><dc:creator><![CDATA[wdormann@infosec.exchange]]></dc:creator><pubDate>Fri, 10 Apr 2026 15:32:42 GMT</pubDate></item><item><title><![CDATA[Reply to There is at least one Adobe Reader 0day being exploited in the wild:https:&#x2F;&#x2F;justhaifei1.blogspot.com&#x2F;2026&#x2F;04&#x2F;expmon-detected-sophisticated-zero-day-adobe-reader.html on Fri, 10 Apr 2026 15:30:52 GMT]]></title><description><![CDATA[<p><span><a href="https://infosec.exchange/@Chris_vonW">@<span>Chris_vonW</span></a></span> <br />No, if JavaScript isn't enabled, the exploit doesn't do a thing.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116381126033070996</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116381126033070996</guid><dc:creator><![CDATA[wdormann@infosec.exchange]]></dc:creator><pubDate>Fri, 10 Apr 2026 15:30:52 GMT</pubDate></item><item><title><![CDATA[Reply to There is at least one Adobe Reader 0day being exploited in the wild:https:&#x2F;&#x2F;justhaifei1.blogspot.com&#x2F;2026&#x2F;04&#x2F;expmon-detected-sophisticated-zero-day-adobe-reader.html on Fri, 10 Apr 2026 15:17:30 GMT]]></title><description><![CDATA[<p><span><a href="/user/wdormann%40infosec.exchange">@<span>wdormann</span></a></span> does the exploit still work with JavaScript disabled in Acrobat?</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/Chris_vonW/statuses/116381073430720333</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/Chris_vonW/statuses/116381073430720333</guid><dc:creator><![CDATA[chris_vonw@infosec.exchange]]></dc:creator><pubDate>Fri, 10 Apr 2026 15:17:30 GMT</pubDate></item><item><title><![CDATA[Reply to There is at least one Adobe Reader 0day being exploited in the wild:https:&#x2F;&#x2F;justhaifei1.blogspot.com&#x2F;2026&#x2F;04&#x2F;expmon-detected-sophisticated-zero-day-adobe-reader.html on Fri, 10 Apr 2026 12:45:57 GMT]]></title><description><![CDATA[<p>As I was looking into this (specifically the <code>readFileIntoStream()</code> part), I was quite disappointed by where ChatGPT would refuse to go further. Because I'm apparently a criminal and all. The irony here being that I already <strong>provided to ChatGPT</strong> the JavaScript that <strong>performs the exploit</strong>. Albeit in a form that isn't readable by humans. As such, ChatGPT's refusal to proceed only <strong>helps the miscreants already performing attacks</strong>.</p><p>Compared to Grok, which just did what I asked.</p><p>I'm not particularly fond of receiving ethical judgment and assumptions about why I'm <strong>doing my job</strong></p>

<div class="row mt-3"><div class="col-12 mt-3"><img class="img-thumbnail" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/380/471/082/065/910/original/a8c101a868ffed25.jpeg" alt="Link Preview Image" /><img class="img-thumbnail" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/380/474/277/618/385/original/4a30bb0409cbc17f.jpeg" alt="Link Preview Image" /><img class="img-thumbnail" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/380/476/531/145/521/original/1cf88b8ac4a6cdb1.jpeg" alt="Link Preview Image" /></div></div>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116380477515550959</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116380477515550959</guid><dc:creator><![CDATA[wdormann@infosec.exchange]]></dc:creator><pubDate>Fri, 10 Apr 2026 12:45:57 GMT</pubDate></item><item><title><![CDATA[Reply to There is at least one Adobe Reader 0day being exploited in the wild:https:&#x2F;&#x2F;justhaifei1.blogspot.com&#x2F;2026&#x2F;04&#x2F;expmon-detected-sophisticated-zero-day-adobe-reader.html on Thu, 09 Apr 2026 23:01:21 GMT]]></title><description><![CDATA[<p><span><a href="/user/davemwilburn%40infosec.exchange">@<span>DaveMWilburn</span></a></span> <br />What makes a PDF reader better than its competition is the number of features that it foists upon you, obviously.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116377235037080166</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116377235037080166</guid><dc:creator><![CDATA[wdormann@infosec.exchange]]></dc:creator><pubDate>Thu, 09 Apr 2026 23:01:21 GMT</pubDate></item><item><title><![CDATA[Reply to There is at least one Adobe Reader 0day being exploited in the wild:https:&#x2F;&#x2F;justhaifei1.blogspot.com&#x2F;2026&#x2F;04&#x2F;expmon-detected-sophisticated-zero-day-adobe-reader.html on Thu, 09 Apr 2026 23:00:15 GMT]]></title><description><![CDATA[<p><span><a href="/user/wdormann%40infosec.exchange">@<span>wdormann</span></a></span> </p><p>0-day in acroread.exe? Are we back in the early twenty teens again?</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/DaveMWilburn/statuses/116377230741168590</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/DaveMWilburn/statuses/116377230741168590</guid><dc:creator><![CDATA[davemwilburn@infosec.exchange]]></dc:creator><pubDate>Thu, 09 Apr 2026 23:00:15 GMT</pubDate></item><item><title><![CDATA[Reply to There is at least one Adobe Reader 0day being exploited in the wild:https:&#x2F;&#x2F;justhaifei1.blogspot.com&#x2F;2026&#x2F;04&#x2F;expmon-detected-sophisticated-zero-day-adobe-reader.html on Thu, 09 Apr 2026 22:47:13 GMT]]></title><description><![CDATA[<p>Over on the Bad Site is a <a href="https://x.com/Gi7w0rm/status/2042370775546482815" rel="nofollow noopener">bit of analysis</a></p><p>The million dollar question is: Is this vulnerability chain, which is honestly used just to provide useful information to the C2 just the warm-up to the <em>real</em> exploit delivered by the C2?</p><p>Or is privileged JavaScript execution enough to do bad things?</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116377179508438661</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116377179508438661</guid><dc:creator><![CDATA[wdormann@infosec.exchange]]></dc:creator><pubDate>Thu, 09 Apr 2026 22:47:13 GMT</pubDate></item><item><title><![CDATA[Reply to There is at least one Adobe Reader 0day being exploited in the wild:https:&#x2F;&#x2F;justhaifei1.blogspot.com&#x2F;2026&#x2F;04&#x2F;expmon-detected-sophisticated-zero-day-adobe-reader.html on Thu, 09 Apr 2026 22:07:37 GMT]]></title><description><![CDATA[<p>The interesting thing about using ntdll.dll as the target for this first vulnerability is that in normal Reader operation, ntdll.dll is accessed.</p><p>So there's no immediate <strong>obvious</strong> symptom of shenanigans. Other than the fact that a C2 server is polled for further instructions that is. <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f602.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--joy" style="height:23px;width:auto;vertical-align:middle" title="😂" alt="😂" /></p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116377023794203548</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116377023794203548</guid><dc:creator><![CDATA[wdormann@infosec.exchange]]></dc:creator><pubDate>Thu, 09 Apr 2026 22:07:37 GMT</pubDate></item></channel></rss>