We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Exploit:Win32/CVE-2020-0601.A
Aliases: No associated aliases
Summary
This malware file has been crafted to contain code that exploits the Windows CryptoAPI Spoofing Vulnerability (CVE-2020-0601). This file might have been forged to spoof legitimate certificates and appear as though it has been signed by a legitimate provider.
Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts.
You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.
Secure configuration
Apply all security updates as soon as possible. Deploy the January 2020 security updates to address this vulnerability.
To get the best and fastest protection from Microsoft Defender Antivirus, ensure it can connect to the cloud protection service. Use the Windows search box to find and open your Virus & threat protection settings and turn on the following:
- Cloud-delivered protection
- Automatic sample submission