DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home Alerts

Cybercriminals abuse Acrobat Sign

March 17, 2023
Reading Time: 2 mins read
in Alerts

 

Cybercriminals have found a new way to distribute info-stealing malware to unsuspecting users: they’re abusing Adobe Acrobat Sign, a cloud-based e-signature service.

Threat actors register with the service and send malicious emails to target email addresses, which originate from Adobe’s servers to bypass security protections and trick recipients into trusting the received email.

Furthermore, Redline is capable of stealing account credentials, cryptocurrency wallets, credit cards, and other information stored on the breached device.

At the same time, researchers at Avast warn that this new trend in cybercrime is highly effective in bypassing security layers and tricking targets.

Highly targeted attacks have also been spotted employing this method, such as in one case where the target owned a popular YouTube channel with many subscribers.

The ZIP archive containing Redline was artificially inflated to 400MB in both cases, which helps protect from anti-virus scans.

This same method was used in recent Emotet malware phishing campaigns.

Cybercriminals are constantly looking for legitimate services that can be abused to promote their malicious emails.

Finally, Avast has shared all details of its findings with Adobe and dochub.com, and it is hoped that the two services will find a way to stop abuse from malware operators.

Read More

Tags: AdobeAlertsAlerts 2023CodeReadyCyber securityCybercriminalsmalwaresMarch 2023Vulnerabilities
0
VIEWS
ADVERTISEMENT

Related Posts

Unpatched IBM file transfer software at Risk

Unpatched IBM file transfer software at Risk

March 31, 2023
Osprey Pump Controller Vulnerabilities

Osprey Pump Controller Vulnerabilities

March 31, 2023
Super FabriXss vulnerability in Azure

Super FabriXss vulnerability in Azure

March 31, 2023
Tool for Cloud Credential Harvesting

Tool for Cloud Credential Harvesting

March 31, 2023

More Articles

Book

Practical Internet of Things Security

December 28, 2022
Alerts

Schneider Electric security advisory

July 13, 2022
Incidents

Internet Society data leak exposed 80,000 members’ login details

February 15, 2022
Alerts

NIST Standardizes Ascon Cryptographic Algorithm for IoT

February 8, 2023

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.