Skip to main content
Skip to main content
Microsoft Security Intelligence
10 entries found.
Updated on Mar 07, 2016

Microsoft security software detects and removes this family of threats.

You should also update your software to be fully protected.

Exploit:HTML/Pangimop is the detection name for an exploit kit also known as Magnitude. It tries to infect your PC with other malware, such as trojans and viruses.

See our page about exploits and learn how to update common software.

When you visit a malicious or compromised website, Magnitude scans your PC for vulnerabilities or weaknesses in your software.

You might visit the website from a link or attachment in an email, or from a previously safe website that has been hacked.

Typically, the Magnitude exploit kit attempts to exploit vulnerabilities in applications such as Oracle Java, Sun Java, Microsoft Internet Explorer, Adobe Acrobat and Adobe Reader.

Alert level: severe
Updated on Sep 25, 2014

Windows Defender detects and removes this threat.

This threat uses an Internet Explorer vulnerability to download and run files on your PC, including other malware.

It runs when you visit a hacked or malicious website and you have a vulnerable version of Internet Explorer.

The following Internet Explorer versions are vulnerable:

  • Internet Explorer 6
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
Alert level: severe
Updated on Oct 27, 2014

Windows Defender detects and removes this threat.

This threat uses an Internet Explorer vulnerability to download and run files on your PC, including other malware.

It runs when you visit a hacked or malicious website and you have a vulnerable version of Internet Explorer.

The following Internet Explorer versions are vulnerable:

  • Internet Explorer 6
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
Alert level: severe
Updated on Jun 27, 2014

Windows Defender detects and removes this threat.

It uses vulnerabilities in recent versions of Adobe Flash Player and Java to install malware on your PC.

You might get this threat if you visit a malicious or hacked website, or by clicking a malicious link in an email.

Alert level: severe
Updated on Apr 21, 2014

Windows Defender detects and removes this threat.

It disables features of your security software and performs click-fraud.

This threat can get on your PC when you visited a malicious or hacked website that used an exploit kit such as Exploit:HTML/Pangimop.C (also known as Magnitude). It is also downloaded by other malware, such as Win32/Vobfus or Win32/Beebone.

Alert level: severe
Updated on Jan 02, 2024
Alert level: severe
Updated on Jan 02, 2024
Alert level: severe
Updated on Jan 17, 2018

Windows Defender detects and removes this threat.

This ransomware can stop you from using your PC or accessing your data.

It is a member of the ransomware-as-a-service category of ransomware, and spreads through email, exploit-kits, and other drive-by downloads. As of September, 2016, we have seen this threat use Exploit:HTML/Pangimop (Magnitude) and Exploit:HTML/Meadgive (Rig) exploit kits in its campaign in the Asian region (Taiwan and South Korea). We have also seen it distributed in email attachments that contain script-based downloaders, such as those written in javascript (.js), Office VBA (Word documents such as .doc and .rtf), and Windows Scripting File (.wsf). As of October 2016, we have seen Cerber delivered through password-protected email attachments, along with other threats.

It might ask you to pay money (in the form of bitcoins) to a malicious hacker. It can play a text-to-speech or synthesized recording, show a web page, or a plain text document. 

Our ransomware FAQ page has more information on this type of threat.

The trend towards increasingly sophisticated malware behavior, highlighted by the use of exploits and other attack vectors, makes older platforms so much more susceptible to ransomware attacks. From June to November 2017, Windows 7 devices were 3.4 times more likely to encounter ransomware compared to Windows 10 devices.

Read our latest report: A worthy upgrade: Next-gen security on Windows 10 proves resilient against ransomware outbreaks in 2017.

 

 

Alert level: severe
Updated on Jan 10, 2018

Microsoft Defender Antivirus detects and removes this threat. 

This ransomware can stop you from using your PC or accessing your data. It might ask you to pay money (in the form of Bitcoins) to a malicious hacker.

This ransomware is installed by the Magnitude exploit kit, which used to deliver another prominent ransomware family, Cerber.

When run, this threat checks the machine's default system language. If the system language is Korean, it launches its malicious routines. Otherwise, self-deletes after three seconds.

It encrypts files using AES 128-bit and appends the file name extension .ihsdj to encrypted files.

Our ransomware FAQ page has more information on this type of threat.

The trend towards increasingly sophisticated malware behavior, highlighted by the use of exploits and other attack vectors, makes older platforms so much more susceptible to ransomware attacks. From June to November 2017, Windows 7 devices were 3.4 times more likely to encounter ransomware compared to Windows 10 devices.

Read our latest report: A worthy upgrade: Next-gen security on Windows 10 proves resilient against ransomware outbreaks in 2017.

Alert level: severe
Updated on Jan 10, 2018

Microsoft Defender Antivirus detects and removes this threat

This ransomware can stop you from using your PC or accessing your data.

It is a member of the ransomware-as-a-service category of ransomware, and spreads through email, exploit-kits, and other drive-by downloads. As of September, 2016, we have seen this threat use Exploit:HTML/Pangimop (Magnitude) and Rig exploit kits in its campaign in the Asian region (Taiwan and South Korea). We have also seen it distributed in email attachments that contain script-based downloaders, such as those written in javascript (.js), Office VBA (Word documents such as .doc and .rtf), and Windows Scripting File (.wsf). As of October 2016, we have seen Cerber delivered through password-protected email attachments, along with other threats.

Cerber encrypts files using both the RSA and RC4 algorithms, and uses the following encrypted file extensions:

  • .cerber
  • .cerber2
  • .cerber3

It might ask you to pay money (in the form of bitcoins) to a malicious hacker. It can play a text-to-speech or synthesized recording, show a web page, or a plain text document.

Our ransomware FAQ page has more information on this type of threat.

The trend towards increasingly sophisticated malware behavior, highlighted by the use of exploits and other attack vectors, makes older platforms so much more susceptible to ransomware attacks. From June to November 2017, Windows 7 devices were 3.4 times more likely to encounter ransomware compared to Windows 10 devices.

Read our latest report: A worthy upgrade: Next-gen security on Windows 10 proves resilient against ransomware outbreaks in 2017.

Alert level: severe