We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
TrojanDownloader:Java/OpenStream.AP
Detected by Microsoft Defender Antivirus
Aliases: Java/OpenStream.F (Avira) Exploit.Java.175 (Dr.Web) Java/TrojanDownloader.OpenStream.NBB (ESET)
Summary
TrojanDownloader:Java/OpenStream.AP is a Java applet trojan (with a size of 6034 bytes) that can be distributed inside a Java .jar package, and is known to exploit the vulnerability discussed in CVE-2010-0840. The CVE-2010-0840 is also known as Java Trusted Chaining vulnerability and allows running arbitrary Java code with escalated privileges outside the sandbox restrictions. The privileges gained as a result of exploiting the vulnerability are normally less or equal the browser's process security privileges. The vulnerability affects Java Runtime Environment version up to Java 6 update 18 inclusive.
To detect and remove this threat and other malicious software that may be installed on your computer, run a full-system scan with an appropriate, up-to-date, security solution. The following Microsoft products will detect and remove this threat:
For more information on antivirus software, see http://www.microsoft.com/windows/antivirus-partners/.
Additional recovery instructions
This threat exploits a known vulnerability in the Java Runtime Environment (JRE). To prevent infection by this threat, make sure that you install the updates available from the vendor. You can read more about this vulnerability from the following link:
It may be necessary to remove older versions of Java that are still present. Keeping old and unsupported versions of Java on your system presents a serious security risk. To read more about why you should remove older versions of Java, see the following information.
Additional removal instructions
This threat may be present in your Temporary Internet Files folder. We recommend that you delete your temporary Internet files to prevent the persistent detection of this threat from within the Temporary Internet Files folder.
To delete the temporary Internet files from Internet Explorer, refer to the following articles: