Exploit:Win32/Pdfjsc.ADY
Exploit:Win32/Pdfjsc.ADY is a malicious PDF file that exploits a vulnerability in Adobe Acrobat and Adobe Reader.
The vulnerabilities, discussed in CVE-2010-0188, allow this malware to download and run arbitrary files, including malware from the following families:
- Trojan:Win32/Simda
- Win32/Zegost (for example, Backdoor:Win32/Zegost.F)
- Win32/Carberp
- Win32/Fareit
- Trojan:Win32/Lockscreen
- Trojan:Win32/Ransom
- Trojan:Win32/Reveton
- Win32/Winwebsec
- Win32/Zbot
The following versions of Adobe Acrobat and Adobe Reader are vulnerable to this exploit:
- Adobe Acrobat and Adobe Reader earlier than 8.2.1
- Adobe Acrobat and Adobe Reader earlier than 9.3.1
Install updates to prevent infection
This malware exploits known vulnerabilities.
You should always install the latest updates available from Adobe to prevent reinfection from this threat, and possible infection from other threats.
Download updates for Adobe products from the following link:
HTML/Fashack
Windows Defender detects and removes this threat.
This threat uses vulnerabilities in Adobe Flash Player, Oracle Java and Silverlight to install malware on your PC.
You might encounter it when you visit compromised or malicious websites.
Exploit:HTML/Fashack.AN
Windows Defender detects and removes this threat.
This threat uses vulnerabilities in Adobe Flash Player, Java and Silverlight to install malware on your PC.
You might encounter it when you visit compromised or malicious websites.
Exploit:HTML/Fashack.G
Windows Defender detects and removes this threat.
This threat uses vulnerabilities in Adobe Flash Player, Oracle Java and Silverlight to install malware on your PC.
You might encounter it when you visit compromised or malicious websites.
Exploit:HTML/Fashack
Windows Defender detects and removes this threat.
This threat uses vulnerabilities in Adobe Flash Player, Oracle Java and Silverlight to install malware on your PC.
You might encounter it when you visit compromised or malicious websites.
Exploit:HTML/Fashack.B
Windows Defender detects and removes this threat.
This threat uses vulnerabilities in Adobe Flash Player, Oracle Java and Silverlight to install malware on your PC.
You might encounter it when you visit compromised or malicious websites.
Win32/Rovnix
Microsoft security software detects and removes this family of threats.
This malware family can download other threats onto your PC, such as Win32/Carberp and Win32/Vundo.
They can be installed on your PC by exploits, or other malware, such as Win32/Upatre.
We have seen new Rovnix variants exploit vulnerabilities addressed in CVE-2013-3660, CVE-2014-4113, and CVE-2015-1701.
Trojan:Win32/Opachki.F
Exploit:Java/CVE-2012-0507.R
Exploit:JS/Blacole.A
Exploit:JS/Blacole.A is the detection for malicious Javascript that loads a series of other exploits. If the computer runs a vulnerable version of certain software and exploitation is successful, various malware may be downloaded.
Exploit:Java/CVE-2012-0507
Windows Defender detects and removes this threat.
This threat uses a Java vulnerability to download and run files on your PC, including other malware.
It runs when you visit a hacked or malicious website and you have a vulnerable version of Java.
The following versions of Java are vulnerable:
- JDK and JRE 7 Update 2 and earlier Java SE
- JDK and JRE 6 Update 30 and earlier Java SE
- JDK and JRE 5.0 Update 33 and earlier Java SE
- SDK and JRE 1.4.2_35 and earlier Java SE
- JavaFX 2.0.2 and earlier JavaFX
To check if you're running a vulnerable version of Java:
- In Control Panel, double-click Programs.
- If Java is installed you will see it in the list of installed programs. Click it to open the Java Control Panel.
- On the General tab, click About to see which version of Java you have installed.
You may get an alert about this threat even if you're not using a vulnerable version of Java. This is because we detect when a website tries to use the vulnerability, even if it isn't successful.