The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
A family of malicious programs designed to infect Android devices. They contain other malicious applications, which are distributed and stealthily installed by these Trojans. Once such dropper is run, it extracts malicious files from its body. These files are transferred to an SD card or to the device’s internal storage for their successive launch and installation.
Android.MulDrop.1
Android.MulDrop.1001
Android.MulDrop.1002
Android.MulDrop.1003
Android.MulDrop.1004
Android.MulDrop.1007
Android.MulDrop.1008
Android.MulDrop.1009
Android.MulDrop.1010
Android.MulDrop.1013
Android.MulDrop.1016
Android.MulDrop.1018
Android.MulDrop.1019
Android.MulDrop.1020
Android.MulDrop.1028
Android.MulDrop.1029
Android.MulDrop.1030
Android.MulDrop.1031
Android.MulDrop.1032
Android.MulDrop.1033
Android.MulDrop.1034
Android.MulDrop.1035
Android.MulDrop.1036
Android.MulDrop.1037
Android.MulDrop.1038
Android.MulDrop.1039
Android.MulDrop.1040
Android.MulDrop.1041
Android.MulDrop.1042
Android.MulDrop.1044
Android.MulDrop.1046
Android.MulDrop.1048
Android.MulDrop.1049
Android.MulDrop.1164
Android.MulDrop.1167
Android.MulDrop.1168
Android.MulDrop.1169
Android.MulDrop.1170
Android.MulDrop.1171
Android.MulDrop.1172
Android.MulDrop.1173
Android.MulDrop.1174
Android.MulDrop.1175
Android.MulDrop.1176
Android.MulDrop.1192
Android.MulDrop.1193
Android.MulDrop.1194
Android.MulDrop.1195
Android.MulDrop.1196
Android.MulDrop.1197
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.