If the malicious PDF opens the browser, it still gets internet access.
Two old analyzes of Didier Stevens regarding PDFs:
In this post, I show how basic features of the PDF language can be used to generate polymorphic variants of (malicious) PDF documents. If you code a PDF parser, write signatures (AV, IDS, …) …
blog.didierstevens.com
Sometimes a piece of malware can execute without even opening the file. As this is the case with the /JBIG2Decode vulnerability in PDF documents, I took the time to produce a short video showing 3 …
blog.didierstevens.com
Although the Shell Extensions problem will be obsolete today I have to admit that it has stayed with me.
I think it is interesting for young MT users to read.
Good night my friend.