The US Computer Emergency Response Team (US-Cert) and Secure Computing issued alerts after several exploit tools were found to be making the rounds in the cyber-crime underworld.
The toolkits are especially dangerous due to their ability to avoid security systems, according to Secure Computing.
The latest attacks catalogue infected users and refrain from sending attacks more than once, making it more difficult for security vendors to track down the source of the attacks and prevent further infections.
In addition to new tools, researchers have also found PDF exploit components being added on to existing attack systems.
The risk is further compounded by the fact that PDF files are commonly found among the home and enterprise worlds and are not always considered to be as risky as other formats by many users.
"The Portable Document Format is one of the file formats of choice commonly used in today's enterprises, since it is widely deployed across different operating systems," the company noted.
"But on a down-side this format has known vulnerabilities which are exploited in the wild."
US-Cert recommends that users protect against the attacks by avoiding untrusted or unsolicited downloads and email attachments.
The organisation also recommends that users keep antivirus and system software up-to-date with the latest patches.
Experts warn of new PDF attacks
By
Shaun Nichols
on Sep 29, 2008 7:49AM

Got a news tip for our journalists? Share it with us anonymously here.
Partner Content

Channel can help lead customers to boosting workplace wellbeing with professional headsets

Build cybersecurity capability with award winning Fortinet training from Ingram Micro
Ingram Micro Ushers in the Age of Ultra

Secure, integrated platforms enable MSPs to focus bringing powerful solutions to customers

Kaseya Dattocon APAC 2024 is Back
Sponsored Whitepapers
-1.jpg&w=100&c=1&s=0)
Stop Fraud Before It Starts: A Must-Read Guide for Safer Customer Communications

The Cybersecurity Playbook for Partners in Asia Pacific and Japan

Pulseway Essential Eight Framework

7 Best Practices For Implementing Human Risk Management

2025 State of Machine Identity Security Report