[A blog post by Ahmad Azizan, practical student @ MyCERT]
Until today, the attack on client-side through Adobe Reader’s vulnerabilities are not slowing down. Even though the patches for known Adobe Reader’s vulnerabilities has been released to public for quite a moment, but there is still a lot of website that hosted the malicious PDF files to unsuspecting users.
PDF analyz3r is currently under heavy development, however, it is still usable, and from my test result, out of 29, 24 malicious PDF file were successfully analyzed and detected.
Here are some of the sample analyses (uncompress passwd : analyz3r):
Send me an email if you have sample to analyze with PDF analyz3r. I would be pleased to give you the output. Until next time, always make sure you are surfing with updated gears. In whatever you do, always try to be safe