Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

2012 Olympic Games Targeted by Old PDF Exploit

Researchers at F-Secure have discovered a PDF being circulated online that is using the upcoming Olympic summer games in London as bait. The interesting thing is that the malicious PDF is targeting an exploit that is nearly 2 years old.

The PDF itself was discovered when F-Secure lab researchers were data mining their collection network for documents that drop executables. Given that the file was a sample collected as part of their ongoing operations, it could have originated from a malicious website, as an email attachment, or both.

Researchers at F-Secure have discovered a PDF being circulated online that is using the upcoming Olympic summer games in London as bait. The interesting thing is that the malicious PDF is targeting an exploit that is nearly 2 years old.

The PDF itself was discovered when F-Secure lab researchers were data mining their collection network for documents that drop executables. Given that the file was a sample collected as part of their ongoing operations, it could have originated from a malicious website, as an email attachment, or both.

It launches a legit document as part of the attack, which happens to be a copy of the London 2012 Olympic schedule that was initially published in 2010. Once the PDF is opened, it exploits CVE-2010-2883. This is what makes the targeted attack interesting; it uses a current event to target an older vulnerability.

Sadly, previously patched exploits are widely targeted because end users and system administrators do not maintain current software versions. In short, criminals use them because they work. In fact, data from Secunia shows that 79-percent of the vulnerabilities exploited in 2011 were targeting 3rd-party software.

Of the top ten most popular 3rd-party applications targeted by criminals, Secunia ranked Adobe’s Flash Player 4th, and Adobe Reader 8th. Patching Adobe software has become a standard level of security management, but it was still problematic for some organizations and end users. This is why Adobe recently started offering a silent update feature in the latest versions.

In regards to F-Secure’s findings, there are some takeaways.

“First, be wary of Olympic (and any other current event) themed e-mails that have attachments and/or links. Second, if you don’t already have the current version of Adobe Reader, you really should go get it now,” the firm wrote in a blog post

Advertisement. Scroll to continue reading.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Vulnerabilities

The latest Chrome update brings patches for eight vulnerabilities, including seven reported by external researchers.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

Vulnerabilities

Apple has released updates for macOS, iOS and Safari and they all include a WebKit patch for a zero-day vulnerability tracked as CVE-2023-23529.