Exploit:SWF/Blacole.K
Exploit:SWF/Blacole.K is a malicious Adobe Shockwave (.SWF) code that exploits a vulnerability in certain versions of Adobe Flash Player that could result in redirecting the web browser or downloading and executing arbitrary files. The vulnerability is discussed in the following articles:
Exploit:AndroidOS/CVE-2011-1823
Exploit:AndroidOS/CVE-2011-1823 is the detection for specially-crafted Android programs that attempt to exploit a vulnerability in the Android operating system to gain root privilege. The vulnerability is discussed in CVE-2011-1823.
Exploit:Java/CVE-2012-0507.A
Exploit:Java/CVE-2012-0507.A is the detection for a malicious Java applet stored within a Java archive (.JAR) that attempts to exploit a vulnerability in the Java Runtime Environment (JRE) up to and including versions 7 update 2, versions 6 update 30 and versions 5 update 33. The vulnerability is described in CVE-2012-0507.
Exploit:Win32/CVE-2012-0002.A
Exploit:Win32/CVE-2012-0002.A is the detection for Proof-of-Concept code that exploits a vulnerability in the Remote Desktop Protocol (RDP). The vulnerability, discussed in CVE-2012-0002, could allow remote code execution and was resolved with the release of Microsoft Security Bulletin MS12-002.
Exploit:Java/CVE-2012-0507.Q
TrojanDownloader:Java/OpenStream.BY
Windows Defender Antivirus detects and removes this threat.
This threat uses a Java vulnerability to download and run files on your PC, including other malware.
It runs when you visit a hacked or malicious website and you have a vulnerable version of Java.
The following versions of Java are vulnerable:
- JDK and JRE 7 Update 4 and earlier Java SE
- JDK and JRE 6 Update 32 and earlier Java SE
- JDK and JRE 5.0 Update 35 and earlier Java SE
- SDK and JRE 1.4.2_37 and earlier Java SE
To check if you're running a vulnerable version of Java:
- In Control Panel, double-click Programs.
- If Java is installed you will see it in the list of installed programs. Click it to open the Java Control Panel.
- On the General tab, click About to see which version of Java you have installed.
You may get an alert about this threat even if you're not using a vulnerable version of Java. This is because we detect when a website tries to use the vulnerability, even if it isn't successful.
There is more information on the vulnerability that this threat uses in the Exploit:Java/CVE-2012-1723 description.
Exploit:Win32/Pdfjsc.ALA
Windows Defender detects and removes this threat.
Exploit:Win32/Pdfjsc.ALA is a specially created PDF file that exploits a vulnerability in Adobe Acrobat and Adobe Reader.
The vulnerability, discussed in CVE-2010-0188, lets this file download and run other files, which might be other malware.
These versions of Adobe Acrobat and Adobe Reader are vulnerable to this exploit:
- Adobe Acrobat and Adobe Reader version 8 earlier than 8.2.1
- Adobe Acrobat and Adobe Reader version 9 earlier than 9.3.1
HackTool:Win32/Mimikatz
Mimikatz is a well-known hacktool used to extract Windows passwords in plain-text from memory, perform pass-the-hash attacks, inject code into remote processes, generate golden tickets, and more. This tool is used by red teams and real threat actors alike due to its powerful toolset and open-source nature allowing for easy modification. This tool is still regularly maintained and kept up to date with latest changes in Windows. Mimikatz is often delivered and executed without writing to disk (fileless) in an attempt to avoid detection.