Called “Shadow attacks” by academics from Ruhr-University Bochum, the technique uses the “enormous flexibility provided by the PDF specification so that shadow documents remain standard-compliant.”
Dedicated Forum to help removing adware, malware, spyware, ransomware, trojans, viruses and more!