Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Android.MobiDash.8362 14.10 14.10.2025 Show
Android.MulDrop.1407 14.10 14.10.2025 Show
Android.BankBot.15735 14.10 14.10.2025 Show
Android.SpyMax.753 14.10 14.10.2025 Show
Android.Dialer.341 14.10 14.10.2025 Show
Android.BankBot.Ermac.162 14.10 14.10.2025 Show
Trojan.MulDrop33.8176 14.10 14.10.2025 Show
Trojan.MulDrop33.7961 14.10 14.10.2025 Show
Trojan.MulDrop33.8114 14.10 14.10.2025 Show
Trojan.MulDrop33.7665 14.10 14.10.2025 Show
Trojan.MulDrop33.7946 14.10 14.10.2025 Show
Trojan.DownLoader49.4214 14.10 14.10.2025 Show
Trojan.MulDrop33.8244 14.10 14.10.2025 Show
Trojan.DownLoader49.4277 14.10 14.10.2025 Show
Trojan.Inject6.6438 14.10 14.10.2025 Show
Trojan.MulDrop33.7789 14.10 14.10.2025 Show
Trojan.Siggen31.61770 14.10 14.10.2025 Show
Trojan.DownLoader49.4275 14.10 14.10.2025 Show
Trojan.Siggen31.61695 14.10 14.10.2025 Show
Trojan.MulDrop33.8399 14.10 14.10.2025 Show
Trojan.MulDrop33.7906 14.10 14.10.2025 Show
Trojan.MulDrop33.8326 14.10 14.10.2025 Show
Trojan.MulDrop33.8057 14.10 14.10.2025 Show
Trojan.MulDrop33.8108 14.10 14.10.2025 Show
Trojan.MulDrop33.8039 14.10 14.10.2025 Show
Trojan.Siggen31.61916 14.10 14.10.2025 Show
Trojan.Inject6.6478 14.10 14.10.2025 Show
Trojan.Siggen31.61684 14.10 14.10.2025 Show
Trojan.DownLoader49.4175 14.10 14.10.2025 Show
Trojan.Siggen31.62073 14.10 14.10.2025 Show
Trojan.MulDrop33.7795 14.10 14.10.2025 Show
Trojan.Inject6.6571 14.10 14.10.2025 Show
Trojan.Inject6.6456 14.10 14.10.2025 Show
Trojan.MulDrop33.7603 14.10 14.10.2025 Show
Trojan.MulDrop33.7986 14.10 14.10.2025 Show
Trojan.MulDrop33.7949 14.10 14.10.2025 Show
Trojan.MulDrop33.8291 14.10 14.10.2025 Show
Trojan.Siggen31.61517 14.10 14.10.2025 Show
Trojan.MulDrop33.8250 14.10 14.10.2025 Show
Trojan.MulDrop33.8076 14.10 14.10.2025 Show
Trojan.MulDrop33.7889 14.10 14.10.2025 Show
Trojan.MulDrop33.8321 14.10 14.10.2025 Show
Trojan.Inject6.6439 14.10 14.10.2025 Show
Trojan.Inject6.6533 14.10 14.10.2025 Show
Trojan.Siggen31.61640 14.10 14.10.2025 Show
Trojan.MulDrop33.8142 14.10 14.10.2025 Show
Trojan.MulDrop33.8025 14.10 14.10.2025 Show
Trojan.Siggen31.61753 14.10 14.10.2025 Show
Trojan.MulDrop33.7897 14.10 14.10.2025 Show
Trojan.MulDrop33.8064 14.10 14.10.2025 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.