Skip to main content
Skip to main content
Microsoft Security Intelligence
Published Feb 17, 2016 | Updated Sep 15, 2017

TrojanSpy:Win32/Nivdort.CX

Detected by Microsoft Defender Antivirus

Aliases: Trojan-FHSS!7F4EA7834FBC (McAfee) Troj/Nivdor-E (Sophos)

Summary

Windows Defender detects and removes this threat.

This threat can steal your online user names and passwords.

It can arrive on your PC as a malicious spam email attachment.

Use the following free Microsoft software to detect and remove this threat:

You should also run a full scan. A full scan might find hidden malware.

Protect your sensitive information

This threat tries to steal your sensitive and confidential information. If you think your information has been stolen, see:

You should change your passwords after you've removed this threat:

Prevent malware infections from spam emails
Configure your Trust Center to disable macros

Set your Trust Center in Microsoft Office programs to 'Disable all except digitally signed macros' to control potential macro installations on machines in your network. Know that some malware would try to get into your system through macros, which usually comes in through the email infection vector. 

See the Office support page to Enable or disable macros in Office files for details. Administratively disabling macros can help prevent malware-ridden macros from downloading ransomware or other threats onto your machine or your network.

For more details about macros, ransomware, advanced persistent threats, and how you can protect your enterprise from them, see the following report and video:

Use cloud protection

The Microsoft Active Protection Service (MAPS) uses cloud protection to help guard against the latest malware threats. It’s turned on by default for Microsoft Security Essentials and Windows Defender for Windows 10. 

Get more help

You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.

If you’re using Windows XP, see our Windows XP end of support page.

Follow us