Adobe targeted malware spikes
Malware targeting Adobe Reader surges in January, GFI says.


There has been a spike in malware taking aim at vulnerabilities in Adobe Reader and the .pdf file format, a report has indicated.
In GFI Software rankings, two of the top 10 detections for January were aimed at exploiting holes within Adobe software.
Adobe has had to deal with a wide range of threats in recent times, although 2011 appeared to have been fairly quiet so far.
At the time of publication, Adobe had not responded to a request for comment on the findings.
Adobe pushed out an advisory earlier this month for updates covering a number of critical flaws.
The software affected included Reader X, or 10.0, for Windows and Macintosh, Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX, Adobe Acrobat X, or 10.0, for Windows and Mac, as well as Acrobat 9.4.1 and earlier versions for Windows and Macintosh.
The company said it expects to push out the updates for Windows and Mac users tomorrow the same day as Patch Tuesday.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Elsewhere in GFI's top 10 malware list, Trojans yet again dominated with seven entries, representing nearly 34 per cent of all malware detections for the month.
The security firm also spotted an increase in the prevalence of the FakeVimes family of rogue security products, of which there are around 17 different members.
The fake antivirus situation was only exacerbated by a scam that spread across Twitter in January.
Accounts started distributing messages promoting rogue software and it is unknown how many users were duped.
"Another indicator of increased rogue activity is the fact that we discovered, and blogged about, 22 new rogues on the GFI Rogue Blog in January," said Tom Kelchner, communications and research analyst for GFI Software.
"That's a lot for one month, considering we've seen an average of between 13 and 14 new iterations per month for the last three years."
Tom Brewster is currently an associate editor at Forbes and an award-winning journalist who covers cyber security, surveillance, and privacy. Starting his career at ITPro as a staff writer and working up to a senior staff writer role, Tom has been covering the tech industry for more than ten years and is considered one of the leading journalists in his specialism.
He is a proud alum of the University of Sheffield where he secured an undergraduate degree in English Literature before undertaking a certification from General Assembly in web development.
-
Should AI PCs be part of your next hardware refresh?
AI PCs are fast becoming a business staple and a surefire way to future-proof your business
By Bobby Hellard Published
-
Westcon-Comstor and Vectra AI launch brace of new channel initiatives
News Westcon-Comstor and Vectra AI have announced the launch of two new channel growth initiatives focused on the managed security service provider (MSSP) space and AWS Marketplace.
By Daniel Todd Published
-
Warning issued over “incomplete” fix for Adobe ColdFusion vulnerability
News An incomplete fix for a vulnerability disclosure could be placing users at risk, researchers warned
By Ross Kelly Published
-
Adobe forced to patch its own failed security update
News Company issues new fix for e-commerce vulnerability after researchers bypass the original update
By Danny Bradbury Published
-
CronRat Magecart malware uses 31st February date to remain undetected
News The malware allows for server-side payment skimming that bypasses browser security
By Rene Millman Published
-
Mekotio trojan continues to spread despite its operators’ arrests
News Hackers have used it in 100 more attacks since arrests
By Rene Millman Published
-
“Trojan Source” hides flaws in source code from humans
News Organizations urged to take action to combat the new threat that could result in SolarWinds-style attacks
By Rene Millman Published
-
What is Emotet?
In-depth A deep dive into one of the most infamous and prolific strains of malware
By Praharsha Anand Last updated
-
Ask more from your CMS
Whitepaper How to get the most value in the shortest timespan
By ITPro Published
-
Fake AnyDesk Google ads deliver malware
News Malware pushed through Google search results
By Rene Millman Published