The post describes a PDF exploit targeting users of Foxit PDF Reader. Check Point Research discovered multiple instances of the exploit being actively used by threat actors. The exploit takes advantage of a flawed design in Foxit Reader, bypassing security measures and allowing the execution of malicious commands.
•52m read time• From research.checkpoint.com
Table of contents
IntroductionThe “Flawed Design”Campaigns utilizing PDF ExploitConclusionYara RulesIOCsSort: