Aliases: No associated aliases
This threat uses a software vulnerability to download and run other files on your PC, including malware.
It runs when you visit a hacked website and you have a vulnerable version of Java. A number of legitimate websites could be hacked to unwillingly host this threat.
The following versions of Java are vulnerable:
- JDK and JRE 7 Update 4 and earlier Java SE
- JDK and JRE 6 Update 32 and earlier Java SE
- JDK and JRE 5.0 Update 35 and earlier Java SE
- SDK and JRE 1.4.2_37 and earlier Java SE
To check if you're running a vulnerable version of Java:
- Go to the control panel (Select Start then Control Panel)
- Select Programs. If Java is installed you will see it in the list of installed programs. Click it to open the Java Control Panel.
- On the General tab, click About to see which version of Java you have installed.
You might get a detection for this threat when you visit a website that has the malicious code, even if you're not using a vulnerable version of Java. This doesn't mean that you have been hacked; it means someone has tried to hack into your PC.
The vulnerability that this threat exploits is described in CVE-2012-1723.
Use the following free Microsoft software to detect and remove this threat:
You should also run a full scan. A full scan might find other, hidden malware.
Make sure you install all available Java updates. You can read more about this vulnerability and download software updates from these links:
You should remove older versions of Java, as keeping old and unsupported versions of Java on your PC is a serious security risk:
If you continue to get alerted about this threat, deleting your temporary Java files can help:
It's also important to keep your other software up to date:
Clear the cache
You should delete your temporary Internet files so your security software doesn't continue to detect this threat:
Get more help
You can also see our advanced troubleshooting page for more help.
If you’re using Windows XP, see our Windows XP end of support page.