We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Exploit:Win32/Pdfjsc.AMU
Aliases: Exploit.PDF (AVG) EXP/Pidief.dpa (Avira) PDF/Trojan.MBHZ-6 (Command) Exploit.PDF.9372 (Dr.Web) Exploit.PDF (Ikarus) PDF/Suspicious.D (Norman) Troj/PDFEx-DW (Sophos) TROJ_PIDIEF.SMZA (Trend Micro)
Summary
Windows Defender detects and removes this threat.
This threat uses an Adobe vulnerability to download and run files, including malware, on your PC.
It runs when you open an infected PDF file and you have a vulnerable version of Adobe Acrobat and Adobe Reader. You might receive this PDF file as an email attachment.
The following versions of Adobe Acrobat and Adobe Reader are vulnerable:
- Adobe Acrobat and Adobe Reader version 8.2.2 and earlier
- Adobe Acrobat and Adobe Reader version 9.3.4 and earlier
Use the following free Microsoft software to detect and remove this threat:
- Microsoft Defender Antivirus for Windows 10 and Windows 8.1, or Microsoft Security Essentials for Windows 7 and Windows Vista
- Microsoft Safety Scanner
You should also run a full scan. A full scan might find hidden malware.
Update Adobe products
Make sure you install all available Adobe updates. You can read more about this vulnerability and download software updates from these links:
It's also important to keep your other software up to date:
Get more help
You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.
If you’re using Windows XP, see our Windows XP end of support page.