We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
TrojanDownloader:Java/OpenConnection.JS
Detected by Microsoft Defender Antivirus
Aliases: Java/OpenStream.F (Norman) Trojan-Downloader.Java.OpenConnection (Ikarus) JAVA_AGENT.FR (Trend Micro)
Summary
TrojanDownloader:Java/OpenConnection.JS is a detection for an obfuscated Java applet that attempts to download and execute arbitrary files from a remote host. It often works in conjunction with Exploit:Java/CVE-2010-0094, which attempts to exploit a vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE and Java for Business 6 Update 18 and 5.0 Update 23.
This vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system, outside its "sand box" environment.
To detect and remove this threat and other malicious software that may be installed on your computer, run a full-system scan with an appropriate, up-to-date, security solution. The following Microsoft products detect and remove this threat:
For more information on antivirus software, see http://www.microsoft.com/windows/antivirus-partners/.
Update vulnerable applications
This threat is associated with an exploit of a known vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE and Java for Business 6 Update 18 and 5.0 Update 23. After removing this threat, make sure that you install the updates available from the vendor.
You can read more about this vulnerability from the following links: