{"id":2919,"date":"2011-04-02T10:24:42","date_gmt":"2011-04-02T14:24:42","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/?p=2919"},"modified":"2022-12-30T16:01:01","modified_gmt":"2022-12-30T21:01:01","slug":"adobe-notes","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/adobe-notes\/","title":{"rendered":"Adobe Notes"},"content":{"rendered":"<h4><a title=\"www.zdnet.com\" href=\"http:\/\/www.zdnet.com\/blog\/security\/report-malicious-pdf-files-becoming-the-attack-vector-of-choice\/8255\" target=\"_blank\" rel=\"noopener noreferrer\">Malicious PDF Files Becoming the Attack Vector of Choice<\/a><\/h4>\n<p><a href=\"https:\/\/acrobat.adobe.com\/us\/en\/acrobat\/pdf-reader.html\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-6484 size-thumbnail\" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"pdf_logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/03\/pdf_logo.jpg?resize=75%2C75&#038;ssl=1\" alt=\"Adobe PDF\" width=\"75\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/03\/pdf_logo.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/03\/pdf_logo.jpg?w=204&amp;ssl=1 204w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a><em> <a title=\"ZDNet\" href=\"http:\/\/www.zdnet.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">ZDNet<\/a> <\/em><a title=\"ZDNet\" href=\"http:\/\/www.zdnet.com\/blog\/security\/report-malicious-pdf-files-becoming-the-attack-vector-of-choice\/8255\" target=\"_blank\" rel=\"noopener noreferrer\">points out<\/a> a report from<a title=\"Symantec\" href=\"https:\/\/securitycloud.symantec.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Symantec\u2019s<\/a> <a title=\"MessageLans\" href=\"https:\/\/www.darkreading.com\/cloud\/symantec-completes-acquisition-of-messagelabs\" target=\"_blank\" rel=\"noopener noreferrer\">MessageLabs<\/a> that malicious PDF files outpace other malicious attachments used in targeted attacks and now represent the attack vector of choice for malicious attackers compared to media, help files, HTMLs and executables.<\/p>\n<p>The report says that office-based file formats are a popular and effective choice used in some targeted attacks. Cybercriminals attempt to bypass spam and email filters by distributing the ubiquitous PDF that is often allow to pass through these layers of protection. In 2009, about 52.6% of targeted attacks used PDF exploits, compared with 65.0% in 2010, an increase of 12.4%. MessageLabs Intelligence Senior Analyst, Paul Wood says,<\/p>\n<blockquote><p>PDF-based targeted attacks are here to stay, and are predicted to worsen as malware authors continue to innovate in the delivery, construction and obfuscation of the techniques necessary for this type of malware<\/p><\/blockquote>\n<h4><a href=\"https:\/\/www.nytimes.com\/2010\/12\/21\/technology\/21adobe.html\" target=\"_blank\" rel=\"noopener noreferrer\">Adobe Posts Its First Billion-Dollar Quarter<\/a><\/h4>\n<p><em><a title=\"Adobe profit\" href=\"http:\/\/www.floridaconstructionlegalupdates.com\/the-difference-between-lost-profit-and-loss-of-use-damages\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-6485 size-thumbnail alignright\" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"Adobe profit\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/04\/adobe_logo.jpg?resize=58%2C75&#038;ssl=1\" alt=\"\" width=\"58\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/04\/adobe_logo.jpg?resize=116%2C150&amp;ssl=1 116w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/04\/adobe_logo.jpg?w=188&amp;ssl=1 188w\" sizes=\"auto, (max-width: 58px) 100vw, 58px\" \/><\/a><a title=\"New York Times\" href=\"https:\/\/www.nytimes.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">The New York Times<\/a><\/em> <a title=\"www.nytimes.com\" href=\"https:\/\/www.nytimes.com\/2010\/12\/21\/technology\/21adobe.html\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> that the software maker Adobe posted its first $1 billion quarter in Q4-2010. Revenue rose 33 percent to $1.01 billion from $757 million last year. Adobe, which is based in San Jos\u00e9, CA makes Photoshop, Acrobat, and Flash software.<\/p>\n<h4>Targeted attacks exploiting PDF bugs are soaring<\/h4>\n<p><em><a title=\"Help Net Security\" href=\"https:\/\/www.helpnetsecurity.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Help Net Security<\/a><\/em> reports that Adobe is having a hard time fighting its bad reputation when it comes to products riddled with vulnerabilities. <em>Help Net Security<\/em> references a report from <a title=\"F-Secure Labs\" href=\"https:\/\/web.archive.org\/web\/20111031205001\/http:\/\/www.f-secure.com:80\/en_EMEA-Labs\" target=\"_blank\" rel=\"noopener noreferrer\">F-Secure&#8217;s Lab<\/a> which says that Adobe Reader exploits are becoming the weapon of choice for many cybercriminals.<\/p>\n<p style=\"font-size: 16px;\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-6486 size-thumbnail\" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"fsecure_logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/04\/fsecure_logo.jpg?resize=75%2C75&#038;ssl=1\" alt=\"F-Secure\" width=\"75\" height=\"75\" \/><\/p>\n<p>This makes patching and updating eminently important. As an example the latest critical vulnerability (<a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2010-0188\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2010-0188<\/a>) which Adobe warned users to update the software to the latest version. Users who missed the memo are vulnerable, <a title=\"F-Secure\" href=\"http:\/\/www.f-secure.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">F-Secure<\/a> (<a href=\"http:\/\/markets.ft.com\/tearsheets\/performance.asp?s=FSC1V:HEX\" target=\"_blank\" rel=\"noopener noreferrer\">FSC1V<\/a>) warns it is being exploited in the wild.<\/p>\n<p>Upon loading the PDF file, an embedded executable is dropped on the victim&#8217;s hard disc and it immediately tries to connect with tiantian (.) ninth (.) biz to download other files.<\/p>\n<p>F-Secure has warned long ago about security problems plaguing Adobe&#8217;s most famous software. The security firm has even advised users to start using an alternative PDF reader. According to<em> Help Net Security<\/em> Adobe&#8217;s, decision to schedule their updates to follow Microsoft&#8217;s Patch Tuesday is a step in the right direction.<\/p>\n<h4>Malicious PDF spam with Sality virus<\/h4>\n<p><em><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-91797 size-thumbnail\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/04\/mac-malware.jpg?resize=56%2C75&#038;ssl=1\" alt=\"\" width=\"56\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/04\/mac-malware.jpg?resize=56%2C75&amp;ssl=1 56w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/04\/mac-malware.jpg?resize=112%2C150&amp;ssl=1 112w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/04\/mac-malware.jpg?w=206&amp;ssl=1 206w\" sizes=\"auto, (max-width: 56px) 100vw, 56px\" \/><a title=\"Help Net Security\" href=\"https:\/\/www.helpnetsecurity.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Help Net Security<\/a><\/em> highlights a <a href=\"https:\/\/web.archive.org\/web\/20240415214827\/https:\/\/www.sophos.com\/en-us\" target=\"_blank\" rel=\"noopener noreferrer\">Sophos<\/a> <a href=\"http:\/\/nakedsecurity.sophos.com\/2010\/07\/02\/pdf-spam-phones-home-sality\/\" target=\"_blank\" rel=\"noopener noreferrer\">warning<\/a> that a malicious email containing the following text has been dropped into inboxes around the world:<\/p>\n<blockquote><p>Hey man..<br \/>\nRemember all those long distance phone calls we made.<br \/>\nWell I got my telephone bill and WOW.<br \/>\nPlease help me and look at the bill see which calls where yours ok..<\/p><\/blockquote>\n<p><a href=\"https:\/\/www.sophos.com\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-117306 size-full\" title=\"Sophos logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/logo_Sophos_Logo.png?resize=120%2C49&#038;ssl=1\" alt=\"Sophos logo\" width=\"120\" height=\"49\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/logo_Sophos_Logo.png?w=120&amp;ssl=1 120w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/logo_Sophos_Logo.png?resize=75%2C31&amp;ssl=1 75w\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" \/><\/a>You surely don&#8217;t remember such an occurrence or the sender of the email, since this is just a ploy to make you open the PhoneCalls(.)pdf attachment, but don&#8217;t let your innate curiosity get the better of you.<\/p>\n<p>The attached file can exploit a vulnerability in how <a href=\"https:\/\/web.archive.org\/web\/20211227034907\/https:\/\/www.adobe.com\/support\/security\/bulletins\/apsb10-07.html\" target=\"_blank\" rel=\"noopener noreferrer\">Adobe Reader handles TIFF images<\/a>\u00a0and proceeds to download and execute a <a href=\"https:\/\/usa.kaspersky.com\/resource-center\/threats\/trojans\" target=\"_blank\" rel=\"noopener noreferrer\">Trojan<\/a> that loads the <a href=\"http:\/\/nakedsecurity.sophos.com\/2009\/04\/17\/sality-epo\/\" target=\"_blank\" rel=\"noopener noreferrer\">Sality<\/a> virus into your system&#8217;s memory. The virus then proceeds to append its encrypted code to executable files, deploys a rootkit, and kills anti-virus applications.<\/p>\n<p>Sophos reminds everyone that opening documents attached to unsolicited emails is like the online equivalent of Russian roulette &#8211; the odds are stacked heavily against you.<\/p>\n<h4><a href=\"https:\/\/web.archive.org\/web\/20100116054058\/http:\/\/www.informationweek.com:80\/blog\/main\/archives\/2010\/01\/adobe_the_new_k.html\" target=\"_blank\" rel=\"noopener noreferrer\">Adobe, The New King Of Security Holes<\/a><\/h4>\n<p><a title=\"Adobe Patches Critical Security Hole in Acrobat, Reader, and Flash\" href=\"https:\/\/web.archive.org\/web\/20111117074522\/http:\/\/www.maximumpc.com\/article\/news\/adobe_patches_critical_security_hole_acrobat_reader_and_flash\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Information Week<\/em><\/a><a href=\"https:\/\/web.archive.org\/web\/20111117074522\/http:\/\/www.maximumpc.com\/article\/news\/adobe_patches_critical_security_hole_acrobat_reader_and_flash\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-6488 size-thumbnail\" style=\"margin: 0px 3px; border: 0pt none;\" title=\"Adobe Patches Critical Security Hole in Acrobat, Reader, and Flash\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/04\/adobe-bugs.jpg?resize=75%2C75&#038;ssl=1\" alt=\"Adobe\" width=\"75\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/04\/adobe-bugs.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/04\/adobe-bugs.jpg?w=250&amp;ssl=1 250w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a> <a href=\"https:\/\/web.archive.org\/web\/20100116054058\/http:\/\/www.informationweek.com:80\/blog\/main\/archives\/2010\/01\/adobe_the_new_k.html\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> that <a href=\"http:\/\/www.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a> (<a href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-MSFT\/\" target=\"_blank\" rel=\"noopener noreferrer\">MSFT<\/a>) has spent more than a decade improving its secure software development and its response to security exploits. As a result, Microsoft is losing the lead in security vulnerabilities and being replaced by <a href=\"https:\/\/www.adobe.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Adobe<\/a> (<a href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-MSFT\/\" target=\"_blank\" rel=\"noopener noreferrer\">ADBE<\/a>).<\/p>\n<p>With Microsoft&#8217;s improved response to security holes, the pickings in Windows itself are getting slimmer. Attackers don&#8217;t have brand loyalty, so they&#8217;ve moved on to another company with lots of PC installed base: Adobe. Security holes are being exploited in Adobe <a href=\"https:\/\/www.adobe.com\/products\/reader.html\" target=\"_blank\" rel=\"noopener noreferrer\">Reader<\/a> and <a href=\"https:\/\/www.adobe.com\/products\/illustrator\/whatisillustrator\/\" target=\"_blank\" rel=\"noopener noreferrer\">Illustrator<\/a>. Adobe makes this problem worse because it has bundled unwanted applications and their <a href=\"https:\/\/web.archive.org\/web\/20120511030827\/http:\/\/www.adobe.com\/\/products\/\/air\/\/\" target=\"_blank\" rel=\"noopener noreferrer\">AIR<\/a> software platform with their free applications like Adobe Reader. Adobe is looking to create an attractive installed base for their developers, but they are also creating an attractive attack surface for the bad guys.<\/p>\n<p>Protecting yourself from Adobe&#8217;s security holes can be difficult.\u00a0 There are non-Adobe solutions such as <a href=\"http:\/\/www.foxitsoftware.com\/pdf\/reader\/\" target=\"_blank\" rel=\"noopener noreferrer\">Foxit Reader<\/a>, which is much faster and lighter than Adobe Reader but has had problems with\u00a0 PDF documents with editable fields. <em>InfoWeek<\/em> provided some specific tips that may help avoid security problems.<\/p>\n<ul>\n<li>Uninstall any Adobe Reader version earlier than 9,\u00a0 and install version 9.<\/li>\n<li>With ver. 9 go to the Edit\/Preferences menu. Make sure that Security(Enhanced) is turned on; (Adobe ships it turned off).<\/li>\n<li>Launch the Updater and be sure you&#8217;re checking for updates, install updates ASAP.<\/li>\n<li>Go to Trust Manager and uncheck the option for &#8220;Allow opening of non-PDF file attachments.&#8221;<\/li>\n<li>Finally, unless you know you need JavaScript in your Acrobat documents, disable JavaScript.<\/li>\n<li><em>RB- Don&#8217;t go to ver. 10, I hate it.<\/em><\/li>\n<\/ul>\n<h6>Related articles<\/h6>\n<ul>\n<li>Iranian Nuclear Program Used as Lure in Flash-based Targeted Attacks (pcworld.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Adobe is fighting the bad reputation its products have F-Secure&#8217;s Lab says that Adobe exploits are the weapon of choice for many cybercriminals.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3045,1806,742,736,357,948,107,413,412,4,281,165,1366],"class_list":["post-2919","post","type-post","status-publish","format-standard","hentry","category-security","tag-3045","tag-acrobat","tag-adbe","tag-adobe-systems","tag-attack-vector","tag-cyber-attack","tag-f-secure","tag-foxit-reader","tag-messagelabs","tag-security","tag-sophos","tag-symantec","tag-symc"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/2919","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=2919"}],"version-history":[{"count":37,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/2919\/revisions"}],"predecessor-version":[{"id":131357,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/2919\/revisions\/131357"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=2919"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=2919"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=2919"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}