Since at least December, malicious actors have been taking advantage of a zero-day vulnerability in Adobe Reader through specially manipulated PDF documents, according to security researcher Haifei Li. Li, founder of the EXPMON-based blast detection platform, warned that it is a highly sophisticated "fingerprinting" PDF-type explosion that identifies target system features and takes advantage of an even unpatched failure to run malicious actions by just opening the file.
The main concern is not only that the attack works without more user interaction than opening a PDF, but that the operation allows both the theft of local information and the possibility of running code later and escape from the sandbox, which could give full control over the committed equipment. Li points out that campaigns have been active for months and that exploited PDFs use Acrobat's privileged APIs as util.readFileIntoStream and RSS.addFeed to extract files and data from the system, as well as download and run additional charges.

The researcher himself published details and samples on his technical blog so that the community can analyze the pattern of attack, and also shared his findings in networks. Your public notice is available at: justhaifei1.blogspot.com and its initial observations on the social network X its public thread. Another intelligence analyst, known as Gi7w0rm, examined the same PDFs and documented that many of the baits were written in Russian and referred to matters of the oil and gas sector, detail that points to a deliberate choice of the hook for certain audiences; its analysis is available in This tweet.
Li has notified Adobe and, while the company is working on a solution, recommends extreme prudence: avoid opening PDFs from unverified or unexpected shipments and consider mitigation measures in the network. Among the strategies that network advocates can implement immediately is monitoring and blocking HTTP / HTTPS traffic containing the "Adobe Synchronizer" chain in the User-Agent header, an indicator observed in these malicious interactions.
This case highlights several points that should be remembered: first, the nature of a zero day implies that there is no public patch at the time of discovery, so that provisional mitigation and the preventive behaviour of the user are the first line of defense. Second, modern exploits often operate in several phases: environment recognition, data exfiltration and additional payloads with remote running or sandbox exhaust capacity (CERs / SBX), making them high-risk threats to business and domestic environments. Li's history in the disclosure of exploited vulnerabilities in real environments - including reports of large supplier software failures - adds weight to the alarm and the need to take rapid action.
Adobe received the notice, although no official response or safety patch had been published until the closure of this note. For further information on corrections and notices, see Adobe's official security page at: helpx.adobe.com / security.html. It is also recommended to monitor vulnerability databases and security agency bulletins such as CISA and NVD of NIST to corroborate the emergence of formal notices: CISA and NVD (NIST).
As a patch arrives, a combination of caution and technical controls should be applied. Maintain up-to-date applications and operating system, open suspicious documents in isolated environments or virtual machines, disable unnecessary functions in the PDF reader (such as JavaScript running in Acrobat) and use network detection solutions to identify unusual user-agent patterns or unexpected downloads can reduce risk. In addition, organizations with security policies can restrict the use of Adobe Reader to users who really need it or force the opening of PDFs with less integrated visors to the system until a correction is published.

This episode is a reminder that traditional vectors - an attractive and apparently harmless PDF - remain effective for attackers when they take advantage of unpatched vulnerabilities. The combination of directed social engineering (zebros in Russian related to the energy industry), fingerprinting techniques to identify valuable environments and the use of Acrobat's internal APIs to exfilter data makes this campaign particularly worrying.
If you receive an unexpected PDF and can't verify its origin, it's probably not to open it and, if you work in an organization, report it to the security team for analysis. Domestic users can scan files with updated antivirus solutions and, in case of suspicion, consult with professionals before interacting with the document. Early dissemination of researchers such as Haifei Li helps alert the community and response teams, and it is essential that software providers respond quickly to these notifications to close the exposure window.
To read directly the alerts and analyses of the above-mentioned researchers, see the Haifei Li thread in X: https: / / x.com / HaifeiLi / status / 2041677065519607917 the additional analysis of Gi7w0rm: https: / / x.com / Gi7w0rm / status / 2042003381158379554, and the technical entry into the researcher's blog: justhaifei1.blogspot.com. Keeping yourself informed through official sources such as Adobe and cybersecurity agencies will help to know when it is safe to reopen documents normally.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...