SweetOrange is an exploit kit that runs various exploits against the user's computer in order to probe for any vulnerabilities present in programs installed on the machine, or in the computer's operating system itself; if the exploit(s) are successful, then the user's machine may be compromised and exposed to further intrusion.
The vulnerabilities leveraged by exploits are usually application or platform specific; in other words, a specific program (or even a specific version of a particular program) must be installed on the machine in order for the exploit to be effective.
To prevent exploitation of such vulnerabilities, please refer to the application vendor for the latest updates and additional advice.
Find the latest advice in our Community Knowledge Base.
See the manual for your F-Secure product on the Help Center.
Submit a file or URL for further analysis.
As with most exploit kits, users may encounter SweetOrange on a compromised site on which an attacker has silently inserted the kit (much like a driveby download attack), or on malicious sites user has been forcibly redirected to from a compromised site.
For more about exploit kits, see Article: Exploit kits.