The post describes a PDF exploit targeting users of Foxit PDF Reader. Check Point Research discovered multiple instances of the exploit being actively used by threat actors. The exploit takes advantage of a flawed design in Foxit Reader, bypassing security measures and allowing the execution of malicious commands.

52m read time From research.checkpoint.com
Post cover image
Table of contents
IntroductionThe “Flawed Design”Campaigns utilizing PDF ExploitConclusionYara RulesIOCs

Sort: