We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Exploit:Win32/Pdfjsc.NJ
Aliases: PDF/Obfusc.Q!Camelot (Command) Pdfjsc.AI (Norman) EXP/Pidief.UK (Avira) Exploit.PDF-JS.Gen (BitDefender) Exploit.Win32.Pdfjsc (Ikarus) Troj/PDFJs-RD (Sophos) Trojan.Pidief (Symantec)
Summary
Exploit:Win32/Pdfjsc.NJ is the detection for a PDF file that contains an obfuscated JavaScript. This JavaScript exploits certain vulnerabilities, such as CVE-2010-0188, in Adobe Acrobat and Adobe Reader, allowing it to download arbitrary files into the affected computer.
To detect and remove this threat and other malicious software that may be installed on your computer, run a full-system scan with an appropriate, up-to-date, security solution. The following Microsoft products detect and remove this threat:
For more information on antivirus software, see http://www.microsoft.com/windows/antivirus-partners/.