http://ewhgmbudmub2m4s6kazu6b3sq27zazmbyol5g7jlbnflfehpxhydnpqd.onion/exploit-pdf/index.html
For this, they have invested a lot
on more complex infection processes, going beyond the traditional
Exploit PDF and using techniques where the malicious payload is
hidden in encrypted files – even using a known file format. This is
what we found in a new PDF Exploit in the wild: it...