9 entries found.
Backdoor:Win32/Meciv.A
Backdoor:Win32/Meciv.A is a detection for a remote access trojan. In the wild, we have seen this malware being installed by TrojanDropper:Win32/Meciv.A, which was distributed as part of the payload on successful exploitation by Exploit:Win32/CVE-2010-3333.
Alert level:
severe
TrojanDropper:Win32/Meciv.A
TrojanDropper:Win32/Meciv.A is a trojan that installs Backdoor:Win32/Meciv.A, a remote access trojan. In the wild, we have seen TrojanDropper:Win32/Meciv.A to be distributed as part of the payload on successful exploitation by Exploit:Win32/CVE-2010-3333.
Alert level:
severe
Exploit:Win32/CVE-2010-3333
Windows Defender detects and removes this threat.
Exploit:Win32/CVE-2010-3333 is a detection for specially-crafted RTF files that try to exploit a vulnerability in Microsoft Word. The vulnerability is discussed in CVE-2010-3333 and resolved with the release of Microsoft Security Bulletin MS10-087.
If you open a document using a version of Microsoft Word that's not updated to the latest secure version, malicious code within the file can run in your PC. We've seen this threat download and drop other malware.
In the wild, we've received samples masquerading as files related to the "Bilawar Bhutto Sex Scandal" and a "New Year's Greeting Card" (with both the file name and message written in Russian).
Alert level:
severe