Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_Generic aliases:

Name Vendor Dr.Web classification name
BKDR_Generic Trend Micro Nuke.Sphere
BKDR_Generic Trend Micro Trojan.DownLoader.46762
BKDR_Generic Trend Micro BackDoor.ProRat.37
BKDR_Generic Trend Micro BackDoor.Generic.1360
BKDR_Generic Trend Micro BackDoor.Haxdoor.169
BKDR_Generic Trend Micro Trojan.PWS.Gamania.10192
BKDR_Generic Trend Micro BackDoor.Pigeon.12537
BKDR_Generic Trend Micro BackDoor.Traitor.21
BKDR_Generic Trend Micro BackDoor.Onwave
BKDR_Generic Trend Micro BackDoor.Haxdoor.167
BKDR_Generic Trend Micro BackDoor.Haxdoor.276
BKDR_Generic Trend Micro BackDoor.Pigeon.9177
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.based
BKDR_Generic Trend Micro BackDoor.Gagost.11
BKDR_Generic Trend Micro BackDoor.Pigeon.12116
BKDR_Generic Trend Micro BackDoor.Karoto
BKDR_Generic Trend Micro BackDoor.Graybird
BKDR_Generic Trend Micro BackDoor.Packet
BKDR_Generic Trend Micro BackDoor.Haxur
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.427
BKDR_Generic Trend Micro Trojan.DownLoader.7561
BKDR_Generic Trend Micro Trojan.MulDrop.3422
BKDR_Generic Trend Micro Trojan.DownLoader.7593
BKDR_Generic Trend Micro Win32.HLLW.MyBot
BKDR_Generic Trend Micro Trojan.Riler
BKDR_Generic Trend Micro BackDoor.HangUp.43745
BKDR_Generic Trend Micro Trojan.KeyLogger.468
BKDR_Generic Trend Micro Trojan.DownLoader.8224
BKDR_Generic Trend Micro BackDoor.Cxc
BKDR_Generic Trend Micro Trojan.DownLoader.8220
BKDR_Generic Trend Micro Trojan.PWS.Banker.2039
BKDR_Generic Trend Micro BackDoor.Forced
BKDR_Generic Trend Micro BackDoor.Dumb
BKDR_Generic Trend Micro BackDoor.DarkMoon.76
BKDR_Generic Trend Micro Trojan.DownLoader.8250
BKDR_Generic Trend Micro Trojan.Annoy
BKDR_Generic Trend Micro Trojan.MulDrop.3518
BKDR_Generic Trend Micro Win32.HLLW.Deadaim
BKDR_Generic Trend Micro BackDoor.WebDor
BKDR_Generic Trend Micro BackDoor.Prosiak.72
BKDR_Generic Trend Micro BackDoor.Looney
BKDR_Generic Trend Micro Trojan.KeyLogger.461
BKDR_Generic Trend Micro BackDoor.ProRat.48
BKDR_Generic Trend Micro BackDoor.Haxdoor.242
BKDR_Generic Trend Micro BackDoor.Assasin.29
BKDR_Generic Trend Micro BackDoor.Fade
BKDR_Generic Trend Micro BackDoor.Action
BKDR_Generic Trend Micro Trojan.PWS.Banker.2036
BKDR_Generic Trend Micro Trojan.KeyLogger.462
BKDR_Generic Trend Micro BackDoor.Beast

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.