We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
TrojanDownloader:Java/OpenConnection.HV
Detected by Microsoft Defender Antivirus
Aliases: JAVA/ClassLoader.BC (Avira) Exploit.Java.120 (Dr.Web) Java/TrojanDownloader.OpenStream.NAN (ESET) Exploit.Java.Bytverify (Ikarus) Troj/JavaDl-AP (Sophos)
Summary
TrojanDownloader:Java/OpenConnection.HV is a detection for a Java applet that attempts to download and execute arbitrary files from a remote host. It often works in conjunction with Exploit:Java/CVE-2010-0094, which attempts to exploit a vulnerability in the Java Runtime Environment (JRE).
To detect and remove this threat and other malicious software that may be installed in your computer, run a full-system scan with an up-to-date antivirus product such as the following:
For more information on antivirus software, see http://www.microsoft.com/windows/antivirus-partners/.
Additional recovery instructions
This threat exploits a known vulnerability in the Java Runtime Environment (JRE). After removing this threat, make sure that you install the updates available from the vendor. You can read more about this vulnerability from the following link:
It may be necessary to remove older versions of Java that are still present. Keeping old and unsupported versions of Java on your system presents a serious security risk. To read more about why you should remove older versions of Java, see the following information.
Additional removal instructions
This threat may be present in your Temporary Internet Files folder. We recommend that you delete your temporary Internet files to prevent the persistent detection of this threat from within the Temporary Internet Files folder.
To delete the temporary Internet files from Internet Explorer, refer to the following articles: