Skip to main content
Published Mar 02, 2015 | Updated Sep 15, 2017

Exploit:HTML/Pangimop

Detected by Microsoft Defender Antivirus

Aliases: Magnitude (other)

Summary

Microsoft security software detects and removes this family of threats.

You should also update your software to be fully protected.

Exploit:HTML/Pangimop is the detection name for an exploit kit also known as Magnitude. It tries to infect your PC with other malware, such as trojans and viruses.

See our page about exploits and learn how to update common software.

When you visit a malicious or compromised website, Magnitude scans your PC for vulnerabilities or weaknesses in your software.

You might visit the website from a link or attachment in an email, or from a previously safe website that has been hacked.

Typically, the Magnitude exploit kit attempts to exploit vulnerabilities in applications such as Oracle Java, Sun Java, Microsoft Internet Explorer, Adobe Acrobat and Adobe Reader.

Use the following free Microsoft software to detect and remove this threat:

You should also run a full scan. A full scan might find hidden malware.

Update Java

Make sure you install all available Java updates. This threat exploits multiple Java vulnerabilities, so installing the latest version of Java helps protect your PC from this threat.

You should remove older versions of Java, as keeping old and unsupported versions of Java on your PC is a serious security risk:

If you continue to get alerted about this threat, deleting your temporary Java files can help:

It's also important to keep your other software up to date:

Update Adobe products

Make sure you install all available Adobe updates. This threat exploits multiple Adobe vulnerabilities, so installing the latest version of Adobe Acrobat, Reader, or Flash helps protect your PC from this threat.

Get more help

You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.

If you’re using Windows XP, see our Windows XP end of support page.

Follow us