Vulnerabilities & CVEs

Adobe Reader Zero-Day Exploited in PDFs Since Dec 2025

Fake invoices disguised as Russian oil payments have been slipping through defenses, exploiting an unpatched Adobe Reader zero-day since late 2025. Security pros spotted the first traces on VirusTotal, but the real damage? It's already underway.

Screenshot of malicious Invoice540.pdf exploiting Adobe Reader zero-day on VirusTotal

Key Takeaways

  • Adobe Reader zero-day exploited via fake Russian oil invoices since Dec 2025, enabling data theft and potential RCE.
  • Targets latest versions; disables need JS off, VirusTotal scans.
  • Echoes historical PDF APTs; energy sector at high risk amid geopolitics.

A nondescript PDF named “Invoice540.pdf” pops up on VirusTotal, November 28, 2025. Harmless-looking. Except it’s not.

Threat actors — slick ones, too — have been hammering an Adobe Reader zero-day since at least December 2025, according to EXPMON researcher Haifei Li. This isn’t some script-kiddie prank. It’s sophisticated JavaScript wizardry hidden in PDFs, luring users with social engineering bait tied to Russia’s oil and gas woes.

Li’s deep dive reveals the exploit’s guts: obfuscated code that auto-triggers on open, grabs sensitive data, phones home to 169.40.2[.]68:45191. And waits for more instructions. A second sample hit VirusTotal March 23, 2026. Persistence pays, apparently.

“The sample acts as an initial exploit with the capability to collect and leak various types of information, potentially followed by remote code execution (RCE) and sandbox escape (SBX) exploits,” Li said.

That’s the money quote. It abuses unpatched Acrobat APIs, works on the latest Reader versions. Boom — privileged access, no user fuss.

How’s This Adobe Reader Zero-Day Actually Pulling It Off?

Picture this: you get an email. “Urgent invoice from Gazprom supplier.” Russian text, current events hook — oil sanctions, pipeline drama. Curiosity wins. Double-click.

JavaScript fires silently. Fingerprints your machine (OS, plugins, the works). Exfils to that shady server. Then? Potential RCE, sandbox jailbreak. Li couldn’t snag the next payload — local test env didn’t cut it. But the setup screams staging for bigger plays.

Data harvest first. Fancy fingerprinting. Follow-on chaos. Classic APT playbook.

Security researcher Gi7w0rm chimed in on X: Russian lures, oil/gas context. Not random. Targeted, maybe at energy sector pros or firms with Russia ties.

Why Target Adobe Reader in 2026?

Adobe Reader’s everywhere — enterprises swear by it for contracts, invoices, reports. 500 million installs, give or take. Fat target. And PDFs? Ubiquitous. Email attachments begging to be opened.

But here’s my take — and it’s sharper than Li’s alert. This reeks of state-backed ops, echoing 2010’s Stuxnet-era PDF exploits that bypassed air-gapped Iranian nukes. Back then, nation-states proved PDFs could chain vulns for persistence. Fast-forward (sorry, couldn’t resist), and Russia’s grinding through energy espionage amid Ukraine fallout. Bold prediction: watch for attribution to GRU-linked groups by summer. Adobe’s PR will spin ‘isolated,’ but market dynamics scream complacency — patching lags as subscriptions roll in.

Li nails it:

“It abuses zero-day/unpatched vulnerability in Adobe Reader that allows it to execute privileged Acrobat APIs, and it is confirmed to work on the latest version of Adobe Reader.”

Unpatched. Latest version. That’s the sting. Users on auto-update? Fine, maybe. But corps with locked-down Readers? Exposed.

Numbers tell the tale. VirusTotal scans spiked post-uploads, but exploitation timeline stretches months. December 2025 start means undetected ops — harvested creds, intel on oil trades? Priceless for sanctions evaders.

And the server? Dead end now, but logs somewhere tell the full story.

Does This Mean Ditch Adobe Reader?

Not yet. But wake-up call, absolutely. Enterprise risk here dwarfs consumer noise — think compliance nightmares under GDPR, SEC rules for energy filings.

Li warns: “Nevertheless, this zero-day/unpatched capability for broad information harvesting and the potential for subsequent RCE/SBX exploitation is enough for the security community to remain on high alert.”

High alert? Understatement. This is red-flag territory. Adobe’s silence so far? Typical. They drop patches monthly, but zero-days like this fester.

My unique angle: compare to 2023’s MOVEit zero-day bonanza. Millions hit. Adobe’s next if they drag feet — stock dips 2-3% on patch day, guaranteed. Investors, note: cybersecurity fatigue is real, but PDF trust is eroding fast.

Mitigations? Simple. Disable JS in Reader (Edit > Preferences > JavaScript > uncheck). Use PDF.js alternatives like Foxit (sandboxed better). Scan attachments with VirusTotal before open. Enterprises: endpoint detection rules for Acrobat API calls.

But long-term? Market shift. Browser-native PDF viewers (Chrome’s solid) eating Adobe’s lunch. This exploit accelerates that — 20% enterprise migration by 2028, I’d bet.

The Bigger Market Shake-Up

Oil/gas angle isn’t fluff. Russia’s economy leans 40% on hydrocarbons. Cyber ops disrupt sanctions intel flows — steal bid data, scout partners. Winners? Attackers padding FSB reports.

Adobe? They’re subscription kings ($15B revenue FY25), but vulns like this chip at moat. Competitors pounce: Nitro, SumatraPDF pitch ‘secure by design.’

Short paragraphs for punch. Long ones for depth.

Expect patches soon — story’s developing. But don’t wait.

**


🧬 Related Insights

Frequently Asked Questions**

What is the Adobe Reader zero-day vulnerability?

It’s an unpatched flaw letting malicious PDFs run privileged code via JavaScript, harvesting data and prepping for RCE. Active since Dec 2025.

How can I protect against Adobe Reader PDF exploits?

Disable JavaScript in Reader settings, scan files on VirusTotal, switch to sandboxed viewers like Chrome or Foxit. Update religiously.

Is this Adobe Reader exploit tied to Russian hackers?

Lures suggest yes — oil/gas themes in Russian. Likely APT, but unconfirmed.

Elena Vasquez
Written by

Senior editor and generalist covering the biggest stories with a sharp, skeptical eye.

Frequently asked questions

What is the Adobe Reader <a href="/tag/zero-day-vulnerability/">zero-day vulnerability</a>?
It's an unpatched flaw letting <a href="/tag/malicious-pdfs/">malicious PDFs</a> run privileged code via JavaScript, harvesting data and prepping for RCE. Active since Dec 2025.
How can I protect against Adobe Reader PDF exploits?
Disable JavaScript in Reader settings, scan files on VirusTotal, switch to sandboxed viewers like Chrome or Foxit. Update religiously.
Is this Adobe Reader exploit tied to Russian hackers?
Lures suggest yes — oil/gas themes in Russian. Likely APT, but unconfirmed.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by The Hacker News

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.