Library
My library

Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Android.RemoteCode.8503 14:58:26 07.04.2025 Show
Android.BankBot.15330 13:43:39 07.04.2025 Show
Android.BankBot.Coper.6751 13:36:11 07.04.2025 Show
Trojan.DownLoader48.26192 03:02:39 07.04.2025 Show
Trojan.MulDrop30.45553 03:02:39 07.04.2025 Show
Trojan.MulDrop30.45475 03:02:39 07.04.2025 Show
Trojan.MulDrop30.45644 03:02:39 07.04.2025 Show
Trojan.MulDrop30.46038 03:02:39 07.04.2025 Show
Trojan.DownLoader48.26542 03:02:39 07.04.2025 Show
Trojan.DownLoader48.26247 03:02:39 07.04.2025 Show
Trojan.Siggen31.7778 03:02:39 07.04.2025 Show
Trojan.MulDrop30.47373 03:02:39 07.04.2025 Show
Trojan.MulDrop30.45733 03:02:38 07.04.2025 Show
Trojan.MulDrop30.47249 03:02:38 07.04.2025 Show
Trojan.MulDrop30.47247 03:02:38 07.04.2025 Show
Trojan.Siggen31.7322 03:02:38 07.04.2025 Show
Trojan.MulDrop30.45716 03:02:38 07.04.2025 Show
Trojan.Tofsee.3097 03:02:38 07.04.2025 Show
Trojan.Tofsee.3103 03:02:38 07.04.2025 Show
Trojan.MulDrop30.47320 03:02:38 07.04.2025 Show
Trojan.MulDrop30.45594 03:02:38 07.04.2025 Show
Trojan.MulDrop30.47126 03:02:38 07.04.2025 Show
Trojan.Tofsee.3027 03:02:38 07.04.2025 Show
Trojan.Siggen31.7387 03:02:38 07.04.2025 Show
Trojan.MulDrop30.45611 03:02:37 07.04.2025 Show
Trojan.Tofsee.3019 03:02:37 07.04.2025 Show
Trojan.Siggen31.7738 03:02:37 07.04.2025 Show
Trojan.Siggen31.7725 03:02:37 07.04.2025 Show
Trojan.MulDrop30.45693 03:02:37 07.04.2025 Show
Trojan.MulDrop30.46920 03:02:37 07.04.2025 Show
Trojan.MulDrop30.47220 03:02:36 07.04.2025 Show
Trojan.MulDrop30.45674 03:02:36 07.04.2025 Show
Trojan.MulDrop30.45921 03:02:36 07.04.2025 Show
Trojan.MulDrop30.45527 03:02:35 07.04.2025 Show
Trojan.Siggen31.7239 03:02:35 07.04.2025 Show
Trojan.MulDrop30.46489 03:02:35 07.04.2025 Show
Trojan.MulDrop30.47185 03:02:35 07.04.2025 Show
Trojan.RKDoor.7533 03:02:35 07.04.2025 Show
Trojan.MulDrop30.47332 03:02:35 07.04.2025 Show
Trojan.MulDrop30.46121 03:02:34 07.04.2025 Show
Trojan.MulDrop30.45751 03:02:34 07.04.2025 Show
Exploit.Siggen3.51146 03:02:34 07.04.2025 Show
Trojan.MulDrop30.47252 03:02:34 07.04.2025 Show
Trojan.MulDrop30.45619 03:02:34 07.04.2025 Show
Trojan.MulDrop30.47376 03:02:34 07.04.2025 Show
Trojan.MulDrop30.47207 03:02:33 07.04.2025 Show
Trojan.MulDrop30.45609 03:02:33 07.04.2025 Show
Trojan.MulDrop30.45758 03:02:33 07.04.2025 Show
Trojan.MulDrop30.46257 03:02:33 07.04.2025 Show
Trojan.MulDrop30.47159 03:02:33 07.04.2025 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.