Exploit:JS/Coolex.A
Exploit:JS/Coolex.A is script contained within an exploit pack known as the "Cool Exploit Kit". It can install arbitrary malware on your computer, including variants from the Trojan:Win32/Reveton family of ransomware trojans that may lock your computer and demand payment of a supposed fine.
For more information on ransomware, please see our FAQs at http://www.microsoft.com/security/portal/Shared/Ransomware.aspx.
Exploit:Win32/Pdfjsc.ADQ
Exploit:Win32/Pdfjsc.ADQ is a malicious PDF file that exploits a vulnerability in Adobe Acrobat and Adobe Reader.
The vulnerabilities, discussed in CVE-2010-0188, allow this malware to download and run arbitrary files.
The following versions of Adobe Acrobat and Adobe Reader are vulnerable to this exploit:
- Adobe Acrobat 8 and Adobe Reader 8 earlier than 8.2.1
- Adobe Acrobat 9 and Adobe Reader 9 earlier than 9.3.1
Exploit:Win32/Pdfjsc.ADY
Exploit:Win32/Pdfjsc.ADY is a malicious PDF file that exploits a vulnerability in Adobe Acrobat and Adobe Reader.
The vulnerabilities, discussed in CVE-2010-0188, allow this malware to download and run arbitrary files, including malware from the following families:
- Trojan:Win32/Simda
- Win32/Zegost (for example, Backdoor:Win32/Zegost.F)
- Win32/Carberp
- Win32/Fareit
- Trojan:Win32/Lockscreen
- Trojan:Win32/Ransom
- Trojan:Win32/Reveton
- Win32/Winwebsec
- Win32/Zbot
The following versions of Adobe Acrobat and Adobe Reader are vulnerable to this exploit:
- Adobe Acrobat and Adobe Reader earlier than 8.2.1
- Adobe Acrobat and Adobe Reader earlier than 9.3.1
Install updates to prevent infection
This malware exploits known vulnerabilities.
You should always install the latest updates available from Adobe to prevent reinfection from this threat, and possible infection from other threats.
Download updates for Adobe products from the following link:
Exploit:Win32/Pdfjsc.AGC
Exploit:Win32/Pdfjsc.AGC is a malicious PDF file that exploits a vulnerability in Adobe Acrobat and Adobe Reader.
The vulnerabilities, discussed in CVE-2010-0188, allow this malware to download and run arbitrary files.
The following versions of Adobe Acrobat and Adobe Reader are vulnerable to this exploit:
- Adobe Acrobat and Adobe Reader earlier than 8.2.1
- Adobe Acrobat and Adobe Reader earlier than 9.3.1
Install updates to prevent infection
This malware exploits known vulnerabilities.
You should always install the latest updates available from the software vendor to prevent reinfection from this threat, and possible infection from other threats.
Download updates for Adobe products from the following link:
HTML/Axpergle
Microsoft security software detects and removes this threat.
It uses vulnerabilities in recent versions of Internet Explorer, Microsoft Silverlight, Adobe Flash Player, and Java to install malware on your PC. We have seen it try to install Ransom:Win32/Reveton, Win32/Troldesh and variants of Win32/Bedep.
The exploit is also called Angler.
You might get this threat if you visit a malicious or hacked website, or by clicking a malicious link in an email.
To learn more about how this threat is being used by cybercriminals,
JS/Axpergle
Windows Defender detects and removes this threat.
It uses vulnerabilities in recent versions of Internet Explorer, Microsoft Silverlight, Adobe Flash Player, and Java to install malware on your PC. We have seen it try to install Ransom:Win32/Reveton and variants of Win32/Bedep.
The exploit is also called Angler.
You might get this threat if you visit a malicious or hacked website, or by clicking a malicious link in an email.
To learn more about how this threat is being used by cybercriminals,
Exploit:JS/Axpergle.I
Microsoft security software detects and removes this threat.
It uses vulnerabilities in recent versions of Internet Explorer, Microsoft Silverlight, Adobe Flash Player, and Java to install malware on your PC. We have seen it try to install Trojan:Win32/Reveton.
You might get this threat if you visit a malicious or hacked website, or by clicking a malicious link in an email.
To learn more about how this threat is being used by cybercriminals,