We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Aliases: Trojan.Win32.Agent.ihpl (Kaspersky) Trojan-FHOH!885352259A4D (McAfee) Troj/Nivdort-BV (Sophos) TROJ_BAYROB.SM4 (Trend Micro)
Windows Defender detects and removes this threat.
This threat can steal your online user names and passwords.
It can arrive on your PC as a malicious spam email attachment.
Use the following free Microsoft software to detect and remove this threat:
- Windows Defender for Windows 8.1 and Windows 10, or Microsoft Security Essentials for Windows 7 and Windows Vista
- Microsoft Safety Scanner
You should also run a full scan. A full scan might find hidden malware.
Protect your sensitive information
This threat tries to steal your sensitive and confidential information. If you think your information has been stolen, see:
You should change your passwords after you've removed this threat:
Prevent malware infections from spam emails
- Be aware of the dangers in opening suspicious emails. Don't open email attachments or links from untrusted sources.
- The Microsoft SmartScreen filter can also help detect spam. It’s built-in and enabled by default in Microsoft email programs.
- Submit spam and non-spam messages to Microsoft for analysis.
Use cloud protection
The Microsoft Active Protection Service (MAPS) uses cloud protection to help guard against the latest malware threats. It’s turned on by default for Microsoft Security Essentials and Windows Defender for Windows 10.
Get more help
If you’re using Windows XP, see our Windows XP end of support page.