New zero-day flaw hits Adobe Acrobat and Reader
Adobe is working to fix the exploit, which is being actively used in the wild.


Adobe has confirmed a zero-day flaw in its Acrobat and Reader products is actively being exploited.
According to a blog post by Symantec researcher Joji Hamada, the attack comes via a PDF loaded with Trojan.Pidief.H, sent as an email attachment.
"The attack attempts to lure email recipients into opening the attachment," he noted. "When the file is opened, a malicious file is dropped and run on a fully patched system with either Adobe Reader or Acrobat installed."
Adobe confirmed the report on its blog, noting it was reported to it yesterday. "We are currently investigating this issue and assessing the risk to our customers," Adobe said. "We will provide an update as soon as we have more information."
Symantec's Hamada added: "In the meantime, I recommend everyone to be extra vigilant during this holiday season, especially when receiving emails from an unknown person."
If that sounds scary, don't panic. Symantec said the rate of infection is "extremely limited" and the risk level is "very low."
Adobe products have been hit by a series of attacks this year, and the firm has followed Microsoft's lead and rolled out its own regular patching update.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Freelance journalist Nicole Kobie first started writing for ITPro in 2007, with bylines in New Scientist, Wired, PC Pro and many more.
Nicole the author of a book about the history of technology, The Long History of the Future.
-
Cleo attack victim list grows as Hertz confirms customer data stolen
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
Lateral moves in tech: Why leaders should support employee mobility
In-depth Encouraging staff to switch roles can have long-term benefits for skills in the tech sector
By Keri Allan
-
The threat prevention buyer's guide
Whitepaper Find the best advanced and file-based threat protection solution for you
By ITPro
-
Supply chain as kill chain
Whitepaper Security in the era Zero Trust
By ITPro
-
Microsoft under fire for “negligent” security practices in scathing critique by industry exec
News Microsoft took more than 90 days to issue a partial fix for a critical Azure vulnerability, researchers found
By Ross Kelly
-
Apple patches zero day linked to spyware campaign
News Kaspersky researchers were the first to report a zero day used in a sophisticated attack chain
By Rory Bathgate
-
Warning issued over “incomplete” fix for Adobe ColdFusion vulnerability
News An incomplete fix for a vulnerability disclosure could be placing users at risk, researchers warned
By Ross Kelly
-
MOVEit cyber attack: Cl0p sparks speculation that it’s lost control of hack
News The hackers return with their second major data-extortion attack of 2023, but may have bitten off more than they can chew
By Connor Jones
-
Microsoft says it knows who was behind cyber attacks on MOVEit Transfer
Dozens of organizations may have already lost data to hackers exploiting the critical flaw
By Rory Bathgate
-
Trend Micro security predictions for 2023
Whitepaper Prioritise cyber security strategies on capabilities rather than costs
By ITPro