Skip to main content
Skip to main content
Microsoft Security Intelligence
34 entries found. Displaying page 2 of 2.
Updated on Mar 12, 2013
Alert level: severe
Updated on Apr 08, 2013
Alert level: severe
Updated on Apr 08, 2013
Alert level: severe
Updated on Aug 22, 2013
Alert level: severe
Updated on Aug 22, 2013
Alert level: severe
Updated on Apr 08, 2013
Alert level: severe
Updated on Apr 08, 2013
Alert level: severe
Updated on Nov 19, 2012
Alert level: severe
Updated on Jul 07, 2014
Alert level: severe
Updated on Jan 10, 2018

Microsoft Defender Antivirus detects and removes this threat.

The threat is a HTML page used by the Ransom:Win32/Urausy.A ransomware trojan.

This threat stops you from loading Windows and displays a full-screen message, commonly called a "lock screen". If this threat asks you to pay a fee or fine, do not pay it. The message is a fraud.

It tries to scare you into paying a fine to unlock your PC.

Our ransomware FAQ page has more information on this type of threat.

The trend towards increasingly sophisticated malware behavior, highlighted by the use of exploits and other attack vectors, makes older platforms so much more susceptible to ransomware attacks. From June to November 2017, Windows 7 devices were 3.4 times more likely to encounter ransomware compared to Windows 10 devices.

Read our latest report: A worthy upgrade: Next-gen security on Windows 10 proves resilient against ransomware outbreaks in 2017.

Alert level: severe
Updated on Sep 25, 2014

Windows Defender detects and removes this threat.

This threat uses an Internet Explorer vulnerability to download and run files on your PC, including other malware.

It runs when you visit a hacked or malicious website and you have a vulnerable version of Internet Explorer.

The following Internet Explorer versions are vulnerable:

  • Internet Explorer 6
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
Alert level: severe
Updated on Oct 27, 2014

Windows Defender detects and removes this threat.

This threat uses an Internet Explorer vulnerability to download and run files on your PC, including other malware.

It runs when you visit a hacked or malicious website and you have a vulnerable version of Internet Explorer.

The following Internet Explorer versions are vulnerable:

  • Internet Explorer 6
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
Alert level: severe
Updated on May 06, 2016

Windows Defender detects and removes this threat.

This threat uses a Java vulnerability to download and run files on your PC, including other malware.

It runs when you visit a hacked or malicious website and you have a vulnerable version of Java.

The following versions of Java are vulnerable:

  • Java Runtime Environment of Oracle Java SE 7 Update 10 and Update 11

To check if you're running a vulnerable version of Java:

  1. In Control Panel, double-click Programs.
  2. If Java is installed you will see it in the list of installed programs. Click it to open the Java Control Panel.
  3. On the General tab, click About to see which version of Java you have installed.

You may get an alert about this threat even if you're not using a vulnerable version of Java. This is because we detect when a website tries to use the vulnerability, even if it isn't successful.

Alert level: severe
Updated on Sep 21, 2014

Windows Defender detects and removes this threat.

This threat uses a Java vulnerability to download and run files on your PC, including other malware.

It runs when you visit a hacked or malicious website and you have a vulnerable version of Java.

The following versions of Java are vulnerable:

  • Java SE Development Kit 7 Update 21 and earlier
  • Java SE Development Kit 6 Update 45 and earlier
  • Java SE Development Kit 5.0 Update 45 and earlier
  • OpenJDK 7

To check if you're running a vulnerable version of Java:

  1. In Control Panel, double-click Programs.
  2. If Java is installed you will see it in the list of installed programs. Click it to open the Java Control Panel.
  3. On the General tab, click About to see which version of Java you have installed.

You may get an alert about this threat even if you're not using a vulnerable version of Java. This is because we detect when a website tries to use the vulnerability, even if it isn't successful.

Alert level: severe