It is observed that cybercriminals are using the name of the North Korean leader Kim Jong-II after his death, to target internet users. Attackers are achieving this by spamming malicious emails containing specially crafted pdf named “BriefintroductionofKim-Jong-il.pdf” This PDF file found to be exploiting CVE-2010-2883 and CVE-2010-3333 Vulnerabilities in Adobe Acrobat Reader. Once successfully exploited, […]
Latest Comments