Attackers impersonate Foxit PDF Reader to spread malware via fake installers. Learn how this campaign uses UltraVNC for stealthy remote access.
blog.gdatasoftware.com
Foxit Software has more than 650 million users and is widely trusted as a lightweight PDF reader. That reputation is exactly what makes it valuable to attackers. The more familiar the software, the easier it is to convince someone that what they are downloading is safe.
Instead of exploiting a vulnerability in Foxit, the attacker does something simpler: They pretend to
be Foxit. That is enough to get users to install malware themselves. A fake installer that looks legitimate can deliver remote access tools, steal credentials, or quietly maintain long term access to a system. This approach has been used repeatedly. In 2024, several campaigns relied on trojanized installers and search engine poisoning to distribute fake PDF software at scale. No exploit required, just trust. Exploitiong weak spots in legitimate programs is another often used tactic -
see our article on ConnectWise.