The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
A family of malicious programs designed to covertly use an infected computer’s resources in order to generate cryptocurrency—for example, Bitcoin.
Trojan.BtcMine.1
Trojan.BtcMine.101
Trojan.BtcMine.1011
Trojan.BtcMine.1019
Trojan.BtcMine.102
Trojan.BtcMine.1025
Trojan.BtcMine.1033
Trojan.BtcMine.105
Trojan.BtcMine.1051
Trojan.BtcMine.1055
Trojan.BtcMine.107
Trojan.BtcMine.1073
Trojan.BtcMine.1084
Trojan.BtcMine.1090
Trojan.BtcMine.1091
Trojan.BtcMine.11
Trojan.BtcMine.110
Trojan.BtcMine.1102
Trojan.BtcMine.1105
Trojan.BtcMine.112
Trojan.BtcMine.113
Trojan.BtcMine.116
Trojan.BtcMine.1169
Trojan.BtcMine.1177
Trojan.BtcMine.118
Trojan.BtcMine.1185
Trojan.BtcMine.119
Trojan.BtcMine.12
Trojan.BtcMine.1214
Trojan.BtcMine.123
Trojan.BtcMine.1247
Trojan.BtcMine.1259
Trojan.BtcMine.1271
Trojan.BtcMine.1324
Trojan.BtcMine.134
Trojan.BtcMine.1347
Trojan.BtcMine.1352
Trojan.BtcMine.1369
Trojan.BtcMine.1370
Trojan.BtcMine.1384
Trojan.BtcMine.1389
Trojan.BtcMine.1393
Trojan.BtcMine.1401
Trojan.BtcMine.1404
Trojan.BtcMine.1415
Trojan.BtcMine.1418
Trojan.BtcMine.142
Trojan.BtcMine.1421
Trojan.BtcMine.143
Trojan.BtcMine.1433
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.