PDF Software: Malware Vulnerabilities

In 2009, the virus "Exploit:JS/Pdfjsc.JU" was created as a detection file specifically designed to exploit vulnerabilities in PDF software. PDF files can be embedded with JavaScript to execute the Exploit:JS detection file, which systematically exploits all vulnerabilities in Adobe Acrobat and Adobe Reader programmes before creating an access point on your computer for trojan horses or for a hacker to access your personal information.

When a PDF containing a malicious JavaScript is executed or opened in PDF software, the JavaScript executes a shellcode. Once the shellcode exploits the PDF software it can perform any action, such as downloading other malware to infect your computer or leaving your computer open to remote access from computer hackers.

Usually, the Exploit:JS file infects a computer system when it is downloaded from malicious websites, opened in an unknown e-mail attachment or opened from an unknown source. The malicious Exploit:JS file can affect PDF software if you are using Adobe Acrobat 9.2, or older versions, on Windows or Mac OS X.


Steps to Prevent Infection

  • Enable your computer's firewall at all times.
  • Ensure your antivirus software is updated frequently.
  • Keep your antivirus software on at all times and run regular scans of your computer system.
  • Using caution when opening PDF documents or accepting files from file transfers.
  • Use antivirus software which also blocks harmful sites when browsing the web to avoid malicious websites downloading or automatically opening malicious PDF files.
  • Avoid downloading pirated software; use licensed PDF software, such as Adobe Acrobat or Adobe Reader.
  • Limit user privileges where necessary on your computer.
  • Create strong user passwords and password protect documents or important files.

United Kingdom - Excite Network Copyright ©1995 - 2022