Skip to main content
Skip to main content
Microsoft Security Intelligence
60 entries found. Displaying page 3 of 3.
Updated on Apr 11, 2011
Trojan:Win32/Opachki.C is a backdoor that modifies a number of system settings, and periodically attempts to download and execute arbitrary files.
Alert level: severe
Updated on Apr 11, 2011
Trojan:Win32/Opachki.F is a backdoor that modifies a number of system settings, and periodically attempts to download and execute arbitrary files.
Alert level: severe
Updated on Apr 11, 2011
Win32/Bredolab is a downloader which is able to download and execute arbitrary files from a remote host.
Alert level: severe
Updated on Jan 28, 2014

Windows Defender detects and removes this threat.

This threat tries to download rogue security software onto your PC, including Win32/FakeRean.

It runs when you visit a malicious web page and move your mouse cursor over certain graphics or images.

Alert level: severe
Updated on Aug 01, 2011
TrojanDownloader:Win32/Stegvob.gen!A is a trojan that silently downloads and installs other programs without consent. This could include the installation of additional malware or malware components to an affected computer.
Alert level: severe
Updated on Aug 01, 2011
TrojanDownloader:Win32/Stegvob.A is a trojan that silently downloads and installs other programs without consent. This could include the installation of additional malware or malware components to an affected computer.
Alert level: severe
Updated on Jan 06, 2012

Exploit:Java/CVE-2011-3544.L is the detection for a malicious Java applet stored within a Java Archive (.JAR) that attempt to exploit a vulnerability in Java Runtime Environment (JRE) component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier. The vulnerability is referred to as CVE-2011-3544 allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to run arbitrary Java code outside of the "sandbox" environment.

Alert level: severe
Updated on Aug 01, 2011

Exploit:JS/Blacole.A is the detection for malicious Javascript that loads a series of other exploits. If the computer runs a vulnerable version of certain software and exploitation is successful, various malware may be downloaded.

Alert level: severe
Updated on Apr 11, 2011
Win32/Oficla is a familiy of trojans that attempts to inject code into running processes in order to download and execute arbitrary files. In the wild, we have observed variants of this family downloading and installing several different malware families, including Win32/FakeScanti and Win32/Cutwail.
Alert level: severe
Updated on Jan 23, 2012

Exploit:Java/CVE-2010-0840.NS is a variant of the Exploit:Java/CVE-2010-0840 family - a detection for a malicious Java applet stored within a Java Archive (.JAR) that attempts to exploit a vulnerability in the Java Runtime Environment (JRE) up to and including version 6 update 18. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system outside its "sandbox" environment. It is discussed in CVE-2010-0840.

Alert level: severe
Updated on Sep 14, 2014
Windows Defender Antivirus detects and removes this threat.
 
This virus can download files, including other malware onto your PC.
 
See the Win32/Cutwail entry for more information.
 
Alert level: severe
Updated on May 20, 2011

Worm:Win32/Rorpian.E is a worm that spreads via network shares and by exploiting the Domain Name System (DNS) Server Service vulnerability. It also downloads additional malware on the computer.

Alert level: severe
Updated on Jan 15, 2012

Privacy Protection is a variant of Win32/FakeRean - a fake antivirus scanner displaying misleading alerts claiming that the computer is infected, and requiring money to be paid to remove these non-existent threats. It may also terminate other processes running on the affected computer.

Alert level: severe
Updated on Nov 20, 2014

Windows Defender detects and removes this threat.

This threat can download other malware onto your PC, including PWS:Win32/Kuluoz.gen!A, Win32/Crowti, and Win32/Zbot.

It can be installed when you open a spam email attachment.

Find out ways that malware can get on your PC.  

Alert level: severe
Updated on May 01, 2016

Windows Defender detects and removes this family of threats.

You should also update your software to be fully protected.

The Blacole exploit pack tries to infect your PC with other malware, such as trojans and viruses. It also known as "Blackhole".

See our page about exploits and learn how to update common software.

When you visit a malicious or compromised website, Blacole scans your PC for vulnerabilities or weaknesses in your software.

You might visit the website from a link or attachment in an email, or from a previously safe website that has been hacked.

The threat uses those vulnerabilities it has found on your PC to download malware onto your PC:

Typically, the Blacole exploit kit attempts to exploit vulnerabilities in applications such as Oracle Java, Sun Java, Adobe Acrobat and Adobe Reader.

Alert level: severe
Updated on Sep 13, 2011
"Security Protection" is a brand of rogue malware detected as Rogue:Win32/FakeRean. It displays fake alerts for non-existent threats and prevents executable files from running on the computer.
Alert level: severe
Updated on Jul 08, 2011
"XP Home Security 2012" is a brand of rogue malware detected as Rogue:Win32/FakeRean. It displays fake alerts for non-existent threats, and prevents certain executable files from running.
Alert level: severe
Updated on Nov 20, 2013

Windows Defender detects and removes this threat.

Internet Security is one brand of the rogue security software that we detect as Win32/FakeRean.

It gives you fake alerts for non-existent threats on your PC. It also stops you from running some programs, such as your security software.  

This threat is usually downloaded onto your PC by other malware.

Alert level: severe
Updated on Jun 14, 2012

Antivirus Protection 2012 is a variant of Win32/FakeRean, a family of rogue malware - fake scanners - that claim to scan your computer for malware, and display fake warnings of malicious files. They then inform you that you need to pay money to register the software in order to remove these non-existent threats. It may also disable the services on your computer and modify your security settings.

Different FakeRean variants may modify various settings on your computer (including security settings), terminate programs or system services, or block access to websites.

Alert level: severe
Updated on Jun 13, 2014

Windows Defender detects and removes this threat.

XP Home Security 2012 is a variant of Win32/FakeRean, a family of rogue malware - fake scanners - that claim to scan your PC for malware. They display fake security warnings that aim to make you alarmed. When you try and remove the fake threats from your PC, you're told that you need to pay to register the software.

Fakerean changes your security settings, making your PC less secure.

It might look like this:

Find out ways that malware can get on your PC.

Alert level: severe