A previously unknown vulnerability in Adobe Acrobat Reader has been exploited by hackers for months, using malicious PDFs to gather system information and determine which targets to fully compromise. The attackers leverage legitimate features in Adobe Reader to harvest data, effectively profiling potential victims. This zero-day exploit allows hackers to stay one step ahead of defenders, as there is no patch currently available to address the issue1. The use of booby-trapped PDFs as a reconnaissance tool enables attackers to selectively deploy secondary payloads, maximizing the impact of their attacks. This targeted approach suggests a high degree of sophistication and planning, making it a significant concern for organizations and individuals alike. The fact that this exploit has been ongoing for months underscores the challenges of detecting and responding to zero-day threats, so what matters most to practitioners is the need to implement robust defenses and monitoring to detect such exploits before they can cause significant harm.