Blacole
Windows Defender detects and removes this family of threats.
You should also update your software to be fully protected.
The Blacole exploit pack tries to infect your PC with other malware, such as trojans and viruses. It also known as "Blackhole".
See our page about exploits and learn how to update common software.
When you visit a malicious or compromised website, Blacole scans your PC for vulnerabilities or weaknesses in your software.
You might visit the website from a link or attachment in an email, or from a previously safe website that has been hacked.
The threat uses those vulnerabilities it has found on your PC to download malware onto your PC:
Typically, the Blacole exploit kit attempts to exploit vulnerabilities in applications such as Oracle Java, Sun Java, Adobe Acrobat and Adobe Reader.
Exploit:JS/Sevdaq
Windows Defender detects and removes this threat.
This threat uses a JavaScript vulnerability to check your PC for security software. It then looks for certain information about your computer that might be used in a future attack. It uses the vulnerability described in CVE-2013-7331 to exploit your PC.
It runs when you visit a hacked or malicious website and you have a vulnerable version of Internet Explorer.
You might get an alert about this threat even if you're not using vulnerable software. This is because we detect when a website tries to use the vulnerability, even if it isn't successful.
Exploit:SWF/Dlcypt.A
Windows Defender detects this threat.
It is an Adobe Shockwave Flash (.SWF) file that may be used by attackers to decrypt and execute encrypted JavaScript files. You might get it from certain malicious websites.
Exploit:JS/Axpergle.J
Microsoft security software detects and removes this threat.
It uses vulnerabilities in recent versions of Internet Explorer, Microsoft Silverlight, Adobe Flash Player, and Java to install malware on your PC. We have seen it try to install Trojan:Win32/Reveton.
You might get this threat if you visit a malicious or hacked website, or by clicking a malicious link in an email.
To learn more about how this threat is being used by cybercriminals,
Exploit:Win32/Pdfjsc.gen!A
Exploit:HTML/CVE-2014-1776
Windows Defender detects and removes this threat.
This threat uses a vulnerability in Internet Explorer 6 through to Internet Explorer 11 to download and run files on your PC, including other malware.
The vulnerability is addressed in Microsoft Security Bulletin MS14-021. It is also described in detail in Microsoft Security Advisory 2963983.
It runs when you visit a hacked or malicious website and you have a vulnerable version of Internet Explorer.
Exploit:HTML/IframeRef.AA
Windows Defender detects and removes this threat.
It is a hidden part of a webpage or email that directs your browser to a website that contains malicious content. This content could download malware onto your PC.
Exploit:SWF/Heapspray.gen!A
Exploit:SWF/Heapspray.gen!A is the generic detection for exploits affecting the Adobe Flash Player virtual machine, which use heap-spraying techniques in order to execute exploit code.
This detection may occur when you browse a webpage containing the malicious code.