This Week in Cybersecurity: Adobe's Four-Month Zero-Day, Russian Subs Near UK Cables, and a Poisoned Download Site
By Heather Walters
From a months-old PDF exploit to submarines mapping internet cables, this week's biggest threats had one thing in common: no one saw them coming.
A PDF that silently profiles its targets. Submarines hovering over transatlantic internet cables. A hardware monitoring site that spent six hours serving malware instead of software. This week's threats were quiet, patient, and harder to see coming than most.
Some of the most consequential security events don't arrive with loud alerts and immediate attribution. They arrive quietly — a PDF opened months ago, a submarine operating just outside territorial waters, a download link that looked right but wasn't. This week's headlines were a study in slow-burn threats. Here's what mattered.
Explore this content with AI:
ChatGPT | Perplexity | Claude | Google AI Mode | Grok
Adobe Acrobat Reader zero-day silently exploited for months before patch
Unknown attackers exploited a zero-day Adobe Acrobat Reader vulnerability since at least November 2025 before it was publicly disclosed — a flaw that security researcher Haifei Li of EXPMON discovered after a suspicious PDF was submitted to the platform in late March. The exploit leans on heavily obfuscated JavaScript that runs as soon as the file is opened, working against even fully up-to-date Reader installations with no clicks required beyond viewing the document. Rather than triggering an immediate payload, it begins pulling system information — OS details, language settings, file paths — and transmitting it back to attacker-controlled servers. Lure documents tied to the exploit contain Russian-language content referencing current events in Russia's oil and gas sector, suggesting the attackers had a specific audience in mind rather than casting a wide net. Adobe released an emergency patch and CISA added CVE-2026-34621 to its Known Exploited Vulnerabilities catalog on April 13, 2026.
Why it matters: A zero-day that spent months in active use before anyone noticed is a sobering reminder of how long targeted campaigns can operate undetected. This wasn't a noisy ransomware drop — it was reconnaissance, quietly identifying which targets were worth fully compromising before making a move. Any organization where employees regularly open PDF attachments, particularly in energy, government, or critical infrastructure sectors, should confirm they are running the patched version of Adobe Reader immediately.
Read more at Help Net Security
Russian submarines spent a month surveilling UK undersea cables
On April 9, the United Kingdom revealed that three Russian submarines had conducted a covert operation lasting more than a month in the North Atlantic, operating above critical undersea cables and pipelines while attempting to remain undetected. Britain accused Russia of using the distraction of events in the Middle East to conduct the operation, deploying military vessels alongside Norwegian forces to monitor and deter the submarines. The vessels have since left the area and no physical damage to infrastructure was confirmed. Security experts noted that the Russian vessels are specialist deep-sea craft designed not just to locate infrastructure, but to assess its resilience — mapping where critical systems sit and how they behave under operational conditions.
Why it matters: Undersea cables carry the vast majority of the world's internet traffic, financial transactions, and cross-border communications. A covert mapping operation of this scale using purpose-built deep-sea submarines represents the kind of pre-positioning that precedes infrastructure disruption rather than casual intelligence gathering. This is the physical layer of a cyber conflict, and it deserves the same attention as a software vulnerability.
CPUID website hijacked to serve malware through CPU-Z and HWMonitor downloads
On April 9, 2026, CPUID's official website was compromised through a backend API breach, with legitimate download links for CPU-Z and HWMonitor replaced by URLs pointing to malicious installers hosted on attacker-controlled infrastructure. The compromise lasted approximately six hours before CPUID identified and remediated the issue. The malicious installers deployed STX RAT, a remote access trojan with broad command capabilities including in-memory execution, reverse proxy tunneling, and desktop interaction. Kaspersky confirmed more than 150 victims across Brazil, Russia, and China, including organizations in retail, manufacturing, consulting, telecommunications, and agriculture. Researchers also noted that the attackers reused the same C2 infrastructure from a prior campaign involving trojanized FileZilla installers — an operational security failure that made detection significantly easier.
Why it matters: CPU-Z and HWMonitor are among the most widely used hardware diagnostics tools in IT and security environments, which made this a high-value target even for a short compromise window. A six-hour window on a trusted software site is more than enough time to reach a significant number of downloads. Anyone who downloaded CPUID software between April 9 at 15:00 UTC and April 10 at 10:00 UTC should treat those systems as potentially compromised and rotate any credentials that may have been cached or accessible.
Anthropic restricts AI model after it autonomously exploited zero-days
Anthropic restricted its Mythos Preview AI model last week after it autonomously identified and exploited zero-day vulnerabilities across every major operating system and browser. Palo Alto Networks' Wendi Whitmore warned that similar capabilities are weeks or months from broader proliferation — a timeline that puts the security community in the uncomfortable position of defending against threats that don't yet have a name.
Why it matters: An AI model that can autonomously discover and exploit zero-days represents a category shift in offensive capability. When that capability proliferates — and the consensus among researchers is that it will, soon — the math on traditional security operations starts to break down. Automation, pre-authorized response playbooks, and identity-based controls that limit lateral movement at the source are no longer aspirational. They're operational requirements.
Final thoughts
This week's headlines share a common thread: patience and stealth are increasingly the defining characteristics of sophisticated threats. A zero-day that ran undetected for months. Submarines mapping infrastructure over the course of weeks. A six-hour download window designed to compromise as many systems as possible before anyone noticed. The organizations best positioned to respond are the ones that don't wait for an alert; they assume something is already in progress and build their defenses accordingly.
Ready to see how OpenVPN can help protect your organization from attacks?
Try the self-hosted Access Server solution or managed CloudConnexa service for free — no credit card required.
See Which One is Right for YouHeather is a writer for OpenVPN.