The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Name | Vendor | Dr.Web classification name |
---|---|---|
TR/Vundo.KT.41 | Avira | BackDoor.Butirat |
Trojan:Win32/Vundo.KT | Microsoft | BackDoor.Butirat |
Trojan.Generic.3064693 | BitDefender | BackDoor.Butirat |
TROJ_VUNDO.SML1 | Trend Micro | BackDoor.Butirat |
TR/Dropper.Gen | Avira | BackDoor.Butirat |
Generic.dx!tuf | McAfee | BackDoor.Butirat |
Packed.Win32.Katusha.o | Kaspersky | BackDoor.Butirat |
Malware-Cryptor.0545 | VirusBlokAda | BackDoor.Butirat |
Gen:Trojan.Heur.FU.dyY@aCHS2z | BitDefender | BackDoor.Butirat |
Trojan.Win32.Generic.pak!cobra | SunBelt | BackDoor.Butirat |
Generic.dx!tug | McAfee | BackDoor.Butirat |
Trojan-Ransom.Win32.PinkBlocker.cap | Kaspersky | BackDoor.Butirat |
Trojan.MTA.0570 | VirusBlokAda | BackDoor.Butirat |
Gen:Trojan.Heur.FU.dyY@a46Hk4e | BitDefender | BackDoor.Butirat |
Trojan.Win32.Generic!BT | SunBelt | BackDoor.Butirat |
BackDoor.Butirat.10
BackDoor.Butirat.101
BackDoor.Butirat.102
BackDoor.Butirat.103
BackDoor.Butirat.11
BackDoor.Butirat.111
BackDoor.Butirat.112
BackDoor.Butirat.113
BackDoor.Butirat.114
BackDoor.Butirat.115
BackDoor.Butirat.116
BackDoor.Butirat.118
BackDoor.Butirat.119
BackDoor.Butirat.123
BackDoor.Butirat.124
BackDoor.Butirat.125
BackDoor.Butirat.126
BackDoor.Butirat.127
BackDoor.Butirat.128
BackDoor.Butirat.13
BackDoor.Butirat.130
BackDoor.Butirat.131
BackDoor.Butirat.132
BackDoor.Butirat.133
BackDoor.Butirat.134
BackDoor.Butirat.135
BackDoor.Butirat.136
BackDoor.Butirat.137
BackDoor.Butirat.138
BackDoor.Butirat.139
BackDoor.Butirat.140
BackDoor.Butirat.141
BackDoor.Butirat.142
BackDoor.Butirat.143
BackDoor.Butirat.145
BackDoor.Butirat.146
BackDoor.Butirat.147
BackDoor.Butirat.148
BackDoor.Butirat.149
BackDoor.Butirat.150
BackDoor.Butirat.151
BackDoor.Butirat.152
BackDoor.Butirat.153
BackDoor.Butirat.154
BackDoor.Butirat.156
BackDoor.Butirat.158
BackDoor.Butirat.159
BackDoor.Butirat.16
BackDoor.Butirat.160
BackDoor.Butirat.161
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.