Skip to main content
Published May 24, 2013 | Updated Sep 15, 2017

Trojan:JS/BlacoleRef.DF

Detected by Microsoft Defender Antivirus

Aliases: No associated aliases

Summary

Microsoft security software detects and removes this threat.

Trojan:JS/BlacoleRef.DF is a type of malware which uses your Internet browser to attack your computer and infect it with other malware, such as trojans and viruses. It belongs to the Blacole family of malware, which together are known as the Blacole (or "Blackhole") exploit kit. 

This threat attacks your computer by exploiting multiple vulnerabilities through your Internet browser if you visit a malicious or compromised webpage.

A vulnerability is like a "hole" in your software that malware can use (or "exploit") to get on your computer. These vulnerabilities, or holes, are fixed by installing updates to the software; this is why it is extremely important to keep all of the programs on your computer up to date. See here for information on how to update some software.

For more information on this threat, see the family description for Trojan:JS/BlacoleRef.

To detect and remove this threat and other malicious software that may be installed on your computer, run a full-system scan with an appropriate, up-to-date, security solution. The following Microsoft products detect and remove this threat:

Additional removal instructions

A detection of this exploit may be triggered from your Java cache, if a previous attempt at exploit has been made. When using Java, the Java cache is known as the Temporary Files folder and is commonly located at C:\Users\<user name>\AppData\Local\Sun\Java\Deployment\cache\. The Temporary Files (or cache) folder contains webpage content that is stored on your hard disk for quick viewing.

We recommend that you delete your temporary Java files to prevent the persistent detection of this exploit from within this folder. For instructions on how to delete temporary Java files, please see the following article:

How do I clear the Java cache?

Update vulnerable Java applications

This threat exploits a known vulnerability in Java. After removing this threat, make sure that you install the updates available from the vendor. You can read more about this vulnerability in Java, as well as where to download the software update from the following links:

It may be necessary to remove older versions of Java that are still present. Keeping old and unsupported versions of Java on your system presents a serious security risk. To read more about why you should remove older versions of Java, see the following information.

Follow us