Google Chrome zero-day used in the wild to collect user data via PDF files
#1
Exclamation 
Quote:A security firm said this week that it discovered PDF documents exploiting a Google Chrome browser zero-day. The vulnerability allowed attackers to collect data from users who opened PDF files inside Chrome's built-in PDF viewer.

Exploit detection service EdgeSpot, the company that found the files, says the PDF documents would contact a remote domain with information on the users' device --such as IP address, OS version, Chrome version, and the path of the PDF file on the user's computer.

This phone-home behavior did not take place when researchers opened the same PDF files in desktop PDF viewer apps, such as Adobe Reader and others, but was limited to Chrome only.

The company said it spotted two distinct sets of malicious PDF files exploiting this Chrome bug, with one series of files being circulated circa October 2017, and the second set in September 2018.

SOURCE: https://www.zdnet.com/article/google-chr...pdf-files/
[-] The following 4 users say Thank You to silversurfer for this post:
  • darktwilight, Der.Reisende, divinenews, harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
PatchMyPC 5.2.0.0 (25-April/2025)
What’s new in 5.2....harlan4096 — 10:33
AMD releases Ryzen 5 7533HS processor wi...
AMD launches new Z...harlan4096 — 10:32
Adobe Acrobat Reader DC 2025.001.20467
Adobe Acrobat Read...harlan4096 — 06:11
GFYI [Official] CheckMAL's AppCheck Pro...
tweet CheckMAL Secu...dhruv2193 — 17:10
Introducing Advanced Chat Privacy: Enhan...
Introducing Advanc...harlan4096 — 11:49

[-]
Birthdays
Today's Birthdays
avatar (50)steakelask
avatar (44)Termoplenka
Upcoming Birthdays
avatar (50)Toligo

[-]
Online Staff
harlan4096's profile harlan4096
Administrator

>