JS/Aimesu
Windows Defender Antivirus detects and removes this threat.
This threat runs on your PC when you visit a hacked or malicious webpage and you are using a vulnerable or out-of-date version of Java, Adobe PDF Reader, or Flash Player.
It then installs other malware on your PC, including components of the "Blackhole" and "Cool" exploit kits. These exploits can download other malware on your PC.
See our exploits page for more information about this type of threat.
Exploit:JS/Blacole.F
Exploit:JS/Blacole.F is a JavaScript that executes a series of malicious code in an attempt to exploit computers that may be running vulnerable versions of certain software. If exploitation is successful, various malware may be downloaded.
Exploit:Win32/CVE-2012-0158.CJ
Windows Defender detects and removes this threat.
This threat uses a Microsoft vulnerability to download and run files on your PC, including other malware. It is also called the "MSCOMCTL.OCX RCE Vulnerability".
It runs if you visit a website, use an Office document or .rtf file (Word document), and have a vulnerable version of the following applications on your PC:
- Microsoft Office 2003 SP3
- Microsoft Office 2003 Web Components SP3
- Microsoft Office 2007 SP2 and SP3
- Microsoft Office 2010 Gold and SP1
It is most often distributed through emails.
You might get an alert about this threat even if you're not using a vulnerable version of the application. This is because we detect when a website or file tries to use the vulnerability, even if it isn't successful.
Exploit:Java/CVE-2011-3544.AO
Exploit:Java/CVE-2010-0840.BQ
Exploit:Java/Blacole.X
Exploit:Win32/Pdfjsc.YF
Exploit:Win32/Pdfjsc.YF is a specially-crafted Portable Document File (PDF), which exploits a vulnerability in Adobe Acrobat and Adobe Reader discussed in the following articles:
It connects to certain servers to download and execute other files.
Exploit:SWF/Blacole.A
Exploit:SWF/Blacole.A is a detection for malicious code within specially crafted Adobe Shockwave flash (.SWF) files. The malicious files are commonly distributed via an exploit kit, known as "Blackhole", within compromised webpages. The malware is capable of redirecting a web browser to another specified website and downloading and executing arbitrary files.
Exploit:SWF/CVE-2011-0611.C
Exploit:SWF/CVE-2011-0611.C is the detection for specially crafted Shockwave Flash (SWF) files that attempt to exploit a vulnerability in Adobe Flash Player that could lead to the execution of arbitrary code. The vulnerability is described in CVE-2011-0611 and Adobe Security Advisory APSA11-02.
Exploit:JS/Mult.AH
Exploit:JS/Mult.AH is a malicious JavaScript that attempts to execute multiple instances of code to exploit a potentially vulnerable operating system environment. The malware could download arbitrary files and send details about the affected computer to a remote attacker.
Exploit:JS/Blacole.CE
JS/Blacole.CE is a detection for a component of the Blackhole exploit kit - a kit used by attackers to distribute malware. Attackers install the kit onto a server, and then when you visit the compromised server, the kit attempts to exploit various, multiple vulnerabilities on your computer in order to install malware. For example, if you browsed a compromised website containing the exploit pack using a vulnerable computer, malware could be downloaded and installed onto your computer.
Typically, the Blackhole exploit kit attempts to exploit vulnerabilities in applications such as Oracle Java, Sun Java, Adobe Acrobat and Adobe Reader.
For more information on this exploit kit, and steps you can take to avoid being compromised, please see the detailed Blacole description, elsewhere in our encyclopedia.
Exploit:HTML/NeutrinoEK.G
Windows Defender detects and removes this threat.
This threat is a webpage that spreads the exploit kit known as Neutrino.
You PC is at risk of infection if you visit this webpage and you have vulnerable software installed on your PC.
You might be redirected to the malicious webpage without your consent.
Exploit:Java/Blacole.AHN
Exploit:Java/Blacole.AHN is a malicious Java applet that attempts to exploit vulnerabilities (CVE-2012-1723 and CVE-2012-0507) in the Java Runtime Environment (JRE) in order to download and install files of an attacker’s choice onto your computer.
If you visit a website containing the malicious code while using a vulnerable version of Java, the exploit is loaded. It then attempts to download and execute files from a remote host/URL; the files that are downloaded and executed could include additional malware.
The following versions of Java are vulnerable to this exploit:
- JDK and JRE 7 Update 4 and earlier Java SE
- JDK and JRE 6 Update 32 and earlier Java SE
- JDK and JRE 5.0 Update 35 and earlier Java SE
- SDK and JRE 1.4.2_37 and earlier Java SE
Exploit:Java/CVE-2008-5353
This threat uses a Java vulnerability to download and run files on your PC, including other malware.
It runs when you visit a hacked or malicious website and you have a vulnerable version of Java.
The following versions of Java are vulnerable:
- JRE for Sun JDK (Java Development Kit) and JRE 6 update 10 and earlier
- JDK and JRE 5.0 update 16 and earlier
- SDK (Software Development Kit) and JRE 1.4.2_18
To check if you're running a vulnerable version of Java:
- In Control Panel, double-click Programs.
- If Java is installed you will see it in the list of installed programs. Click it to open the Java Control Panel.
- On the General tab, click About to see which version of Java you have installed.
Exploit:Java/CVE-2011-3544.gen!A
Exploit:Java/CVE-2011-3544.gen!A is a generic detection for a malicious Java applet stored within a Java Archive (.JAR) that attempts to exploit a vulnerability in a Java Runtime Environment (JRE) component in Oracle, JAVA SE JDK and JRE 7, 6 update 27 and earlier. The vulnerability, discussed in CVE-2011-3544, allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to run arbitrary Java code outside of the "sandbox" environment.
Exploit:Win32/Pdfjsc.AAP
Exploit:Win32/Pdfjsc.AAP is the detection for specially-crafted PDF files that target software vulnerabilities in Adobe Acrobat and Adobe Reader. The vulnerabilities, discussed in CVE-2010-0188, could allow a remote attacker to cause a denial of service or application crash or possibly execute arbitrary code.
Exploit:Win32/Pdfjsc.YZ
Exploit:Win32/Pdfjsc.YZ is a specially-crafted Portable Document File (PDF), which exploits a vulnerability in Adobe Acrobat and Adobe Reader discussed in the following articles:
When executed in a vulnerable version of Adobe Acrobat or Adobe Reader, it attempts to download a certain file. It has been found included in the Blackhole exploit kit.
Exploit:JS/Fiexp.B
Windows Defender detects and removes this threat.
This threat can infect your PC if it is running vulnerable software, including:
- Adobe Flash Player version 10 update 3 and earlier, and version 11 update 5 and earlier.
- Silverlight version 5 and earlier.
If your PC has vulnerable software this threat can download other malware, including Win32/Miuref.
You might get an alert about this threat even if you're not using a vulnerable software. This is because we detect when a website tries to use the vulnerability, even if it isn't successful.
Exploit:JS/Axpergle.A
Windows Defender detects and removes this threat.
It uses vulnerabilities in recent versions of Microsoft Silverlight, Adobe Flash Player, and Java to install malware on your PC. We have seen it try to install PWS:Win32/Zbot.
You might get this threat if you visit a malicious or hacked website, or by clicking a malicious link in an email.
To learn more about how this threat is being used by cybercriminals,