Security firm F-Secure has reported that a PDF claiming to be the 2012 Olympic schedule is actually a decoy file.
Once downloaded, the file attempts to make network connections to a Chinese site called Baotoushi.
The PDF exploits CVE-2010-2883, which affects older versions of Adobe Reader and Acrobat. The firm suggests downloading the current version of these programs and to be wary of any 'current event' themed e-mails that have attachments and/or links.
F-Secure explains on its site that a typical PDF exploit will launch a clean decoy as part of its attack; in this case the decoy is a copy of the London 2012 Olympic schedule circa October 2010. The original source PDF can still be found online at london2012.com.
For more information about the malware visit F-Secure.
Want to receive up-to-the-minute tech news straight to your inbox? Then click here to sign up for the completely free PCR Daily Digest and Newsflash email services. You can also follow PCR on Twitter and Facebook.