The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
A backdoor designed to control infected computers. Depending on the version, different file names are used. For example, file names that correspond to the first version look as follows:
The following are file names corresponding to the second version:
The file name that corresponds to the third version is as follows:
Once the iexplore.exe process is launched, the core module is injected into it to ensure communication with the command and control server.
Encrypted configuration data contains the command and control server address.
For example, one of the following addresses can be used:
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.