Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.MulDrop27.65341 03:01:50 27.07.2024 Show
Trojan.Inject5.6563 03:01:50 27.07.2024 Show
Trojan.DownLoader47.11812 03:01:50 27.07.2024 Show
Trojan.Siggen15.24483 03:01:50 27.07.2024 Show
Trojan.DownLoader47.11809 03:01:50 27.07.2024 Show
Trojan.MulDrop27.65288 03:01:49 27.07.2024 Show
Trojan.Siggen29.7426 03:01:49 27.07.2024 Show
Trojan.Siggen29.7251 03:01:49 27.07.2024 Show
Trojan.Siggen29.7457 03:01:49 27.07.2024 Show
Trojan.MulDrop27.65201 03:01:49 27.07.2024 Show
Trojan.DownLoader47.11679 03:01:49 27.07.2024 Show
Trojan.Siggen29.7326 03:01:49 27.07.2024 Show
Trojan.DownLoader47.11798 03:01:49 27.07.2024 Show
Exploit.Siggen3.49703 03:01:49 27.07.2024 Show
Trojan.Siggen29.7353 03:01:49 27.07.2024 Show
Trojan.MulDrop27.65174 03:01:49 27.07.2024 Show
Trojan.Inject5.6560 03:01:48 27.07.2024 Show
Trojan.Siggen29.7582 03:01:48 27.07.2024 Show
Trojan.MulDrop27.65127 03:01:48 27.07.2024 Show
Trojan.DownLoader47.11684 03:01:48 27.07.2024 Show
Trojan.MulDrop27.65257 03:01:48 27.07.2024 Show
Trojan.Siggen29.7420 03:01:48 27.07.2024 Show
Trojan.DnsChange.18921 03:01:48 27.07.2024 Show
Trojan.Siggen29.7411 03:01:48 27.07.2024 Show
Trojan.Siggen29.7554 03:01:48 27.07.2024 Show
Trojan.Siggen29.7283 03:01:47 27.07.2024 Show
Trojan.MulDrop27.65252 03:01:47 27.07.2024 Show
Trojan.MulDrop27.65163 03:01:47 27.07.2024 Show
Trojan.DownLoader47.11728 03:01:47 27.07.2024 Show
Trojan.Siggen29.7521 03:01:47 27.07.2024 Show
Trojan.Siggen29.7446 03:01:47 27.07.2024 Show
Trojan.Siggen29.7390 03:01:47 27.07.2024 Show
Trojan.Siggen29.7485 03:01:47 27.07.2024 Show
Trojan.MulDrop27.65183 03:01:47 27.07.2024 Show
Trojan.DownLoader47.11774 03:01:47 27.07.2024 Show
Trojan.DownLoader47.11636 03:01:47 27.07.2024 Show
Trojan.Siggen29.7290 03:01:47 27.07.2024 Show
Trojan.MulDrop27.65138 03:01:47 27.07.2024 Show
Trojan.Siggen29.7529 03:01:47 27.07.2024 Show
Trojan.MulDrop27.65297 03:01:47 27.07.2024 Show
Trojan.Siggen29.7489 03:01:46 27.07.2024 Show
Trojan.DownLoader47.11826 03:01:46 27.07.2024 Show
Trojan.DownLoader47.11652 03:01:46 27.07.2024 Show
Trojan.DownLoader47.11705 03:01:46 27.07.2024 Show
Trojan.Siggen29.7454 03:01:46 27.07.2024 Show
Trojan.Siggen29.7380 03:01:46 27.07.2024 Show
Trojan.MulDrop27.65324 03:01:46 27.07.2024 Show
Trojan.MulDrop27.65305 03:01:46 27.07.2024 Show
Trojan.KillProc2.23328 03:01:45 27.07.2024 Show
Trojan.Siggen29.7387 03:01:45 27.07.2024 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.