Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Android.BankBot.16109 05:58:44 24.01.2026 Show
Android.MobiDash.9062 05:32:20 25.01.2026 Show
Android.Hidden.12486 05:30:51 24.01.2026 Show
Android.Hidden.12487 05:26:25 25.01.2026 Show
Android.MobiDash.9061 05:21:38 25.01.2026 Show
Trojan.MulDrop35.32615 03:04:57 25.01.2026 Show
Trojan.MulDrop35.32940 03:04:56 25.01.2026 Show
Trojan.MulDrop35.32846 03:04:55 25.01.2026 Show
Trojan.MulDrop35.33187 03:04:55 25.01.2026 Show
Trojan.MulDrop35.32408 03:04:55 25.01.2026 Show
Trojan.MulDrop35.32419 03:04:55 25.01.2026 Show
Trojan.MulDrop35.32061 03:04:54 25.01.2026 Show
Trojan.MulDrop35.32151 03:04:54 25.01.2026 Show
Trojan.MulDrop35.33369 03:04:54 25.01.2026 Show
Trojan.MulDrop35.32863 03:04:54 25.01.2026 Show
Trojan.MulDrop35.33493 03:04:54 25.01.2026 Show
Trojan.MulDrop35.33217 03:04:53 25.01.2026 Show
Trojan.DownLoader49.30272 03:04:53 25.01.2026 Show
Trojan.MulDrop35.32918 03:04:53 25.01.2026 Show
Trojan.DownLoader49.30162 03:04:53 25.01.2026 Show
Trojan.MulDrop35.33520 03:04:53 25.01.2026 Show
Trojan.PWS.Siggen5.31632 03:04:53 25.01.2026 Show
Trojan.DownLoader49.30115 03:04:53 25.01.2026 Show
Trojan.Siggen32.20702 03:04:52 25.01.2026 Show
Trojan.MulDrop35.33457 03:04:52 25.01.2026 Show
Trojan.MulDrop35.33036 03:04:52 25.01.2026 Show
Trojan.DownLoader49.30260 03:04:51 25.01.2026 Show
Trojan.MulDrop35.32906 03:04:51 25.01.2026 Show
Trojan.MulDrop35.31849 03:04:51 25.01.2026 Show
Trojan.MulDrop35.33101 03:04:51 25.01.2026 Show
Trojan.PWS.Siggen5.31619 03:04:51 25.01.2026 Show
Trojan.Siggen32.20665 03:04:51 25.01.2026 Show
Trojan.MulDrop35.31994 03:04:50 25.01.2026 Show
Trojan.Inject6.24074 03:04:50 25.01.2026 Show
Trojan.MulDrop35.32607 03:04:50 25.01.2026 Show
Trojan.MulDrop35.33145 03:04:50 25.01.2026 Show
Trojan.MulDrop35.32479 03:04:49 25.01.2026 Show
Trojan.MulDrop35.33014 03:04:49 25.01.2026 Show
Trojan.Siggen32.20534 03:04:49 25.01.2026 Show
Trojan.MulDrop35.32635 03:04:49 25.01.2026 Show
Trojan.MulDrop35.32968 03:04:49 25.01.2026 Show
Trojan.Siggen32.20636 03:04:48 25.01.2026 Show
Trojan.MulDrop35.32973 03:04:48 25.01.2026 Show
Trojan.MulDrop35.32760 03:04:48 25.01.2026 Show
Trojan.MulDrop35.32145 03:04:48 25.01.2026 Show
Trojan.Siggen32.20678 03:04:48 25.01.2026 Show
Trojan.DownLoader49.30313 03:04:48 25.01.2026 Show
Trojan.MulDrop35.31859 03:04:47 25.01.2026 Show
Trojan.Siggen32.20645 03:04:47 25.01.2026 Show
Trojan.MulDrop35.32449 03:04:47 25.01.2026 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.