Researchers identified a PDF exploit targeting Foxit Reader users that uses a design flaw that presents security warnings with a default “OK” option, potentially tricking users into executing malicious code. The exploit is actively being used and bypasses typical detection methods due to its focus on Foxit Reader, a lesser-known PDF viewer compared to the industry-standard Adobe Acrobat Reader. Due to a design flaw in its warning messages, Foxit Reader has a serious security vulnerability that can trick users into unknowingly jeopardizing their security if they click it twice without giving it careful consideration. Default option triggering malicious command. The exploit grants attackers the ability to download and execute malicious code from a remote server, potentially giving them unauthorized access to a user’s system and data.
Source: GBHackers