Skip to main content
Skip to main content
Microsoft Security Intelligence
27 entries found. Displaying page 2 of 2.
Updated on Jun 23, 2011
TrojanDownloader:Win32/Chepvil.K is a trojan that silently downloads and installs other programs without consent. This could include the installation of additional malware or malware components to an affected computer.
Alert level: severe
Updated on Sep 20, 2015

Windows Defender detects and removes this threat.

This trojan tries to steal your passwords and sensitive information. It can also download other malware onto your PC, including other variants of Win32/Kuluoz and Win32/Sirefef, and variants of rogue security software such as Win32/FakeSysdef and Win32/Winwebsec.

Find out ways that malware can get on your PC.

Alert level: severe
Updated on Mar 14, 2012

Exploit:Win32/Pdfjsc.RM is a detection for a PDF file that contains an obfuscated malicious JavaScript that attempts to contact remote hosts in order to download arbitrary files.

Alert level: severe
Updated on Dec 06, 2011

Exploit:JS/Blacole.W is the detection for malicious JavaScript that loads a series of other exploits that are distributed as components of the "Blackhole kit". If the computer runs a vulnerable version of certain software and exploitation is successful, various malware may be downloaded.

Alert level: severe
Updated on Mar 19, 2012

JS/Bepexp is a family of JavaScript malware that loads multiple exploits in an attempt to compromise the host system, when browsing webpages containing the script. Various software vulnerabilities may be targeted, depending on the target system configuration.

Alert level: severe
Updated on May 01, 2016

Windows Defender detects and removes this family of threats.

You should also update your software to be fully protected.

The Blacole exploit pack tries to infect your PC with other malware, such as trojans and viruses. It also known as "Blackhole".

See our page about exploits and learn how to update common software.

When you visit a malicious or compromised website, Blacole scans your PC for vulnerabilities or weaknesses in your software.

You might visit the website from a link or attachment in an email, or from a previously safe website that has been hacked.

The threat uses those vulnerabilities it has found on your PC to download malware onto your PC:

Typically, the Blacole exploit kit attempts to exploit vulnerabilities in applications such as Oracle Java, Sun Java, Adobe Acrobat and Adobe Reader.

Alert level: severe
Updated on May 01, 2012

Win32/Hiloti is a family of trojans that interferes with an affected user's browsing habits and downloads and executes arbitrary files.

Alert level: severe