Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_Generic aliases:

Name Vendor Dr.Web classification name
BKDR_Generic Trend Micro BackDoor.Iroffer.1235
BKDR_Generic Trend Micro BackDoor.Pigeon.11102
BKDR_Generic Trend Micro BackDoor.Pigeon.1884
BKDR_Generic Trend Micro BackDoor.Pigeon.9919
BKDR_Generic Trend Micro BackDoor.Pigeon.9816
BKDR_Generic Trend Micro Trojan.PWS.Gamania.9011
BKDR_Generic Trend Micro BackDoor.Pigeon.8615
BKDR_Generic Trend Micro BackDoor.Pigeon.4034
BKDR_Generic Trend Micro BackDoor.Huai.614
BKDR_Generic Trend Micro Trojan.MulDrop.12406
BKDR_Generic Trend Micro Trojan.MulDrop.6991
BKDR_Generic Trend Micro BackDoor.Pigeon.9135
BKDR_Generic Trend Micro BackDoor.IRC.Simplbot
BKDR_Generic Trend Micro BackDoor.Dolan
BKDR_Generic Trend Micro Trojan.DownLoader.50537
BKDR_Generic Trend Micro BackDoor.Checkno.2
BKDR_Generic Trend Micro Trojan.DownLoad.42841
BKDR_Generic Trend Micro Trojan.MulDrop.10974
BKDR_Generic Trend Micro BackDoor.Pigeon.8756
BKDR_Generic Trend Micro Trojan.Warring
BKDR_Generic Trend Micro BackDoor.HackDef.481
BKDR_Generic Trend Micro BackDoor.Kanji
BKDR_Generic Trend Micro BackDoor.PcClient.550
BKDR_Generic Trend Micro BackDoor.Pigeon.9021
BKDR_Generic Trend Micro Trojan.Ranky.40488
BKDR_Generic Trend Micro BackDoor.Rswap
BKDR_Generic Trend Micro Trojan.DownLoad.21
BKDR_Generic Trend Micro Trojan.MulDrop.11909
BKDR_Generic Trend Micro BackDoor.Bifrost.417
BKDR_Generic Trend Micro Trojan.DownLoader.49197
BKDR_Generic Trend Micro BackDoor.Pazus.19
BKDR_Generic Trend Micro BackDoor.Leniv
BKDR_Generic Trend Micro Win32.HLLW.Medbod.3
BKDR_Generic Trend Micro Trojan.DownLoader.50500
BKDR_Generic Trend Micro Trojan.Hooker.207
BKDR_Generic Trend Micro Trojan.KeyLogger.244
BKDR_Generic Trend Micro BackDoor.Bilgi
BKDR_Generic Trend Micro BackDoor.NetBus.160
BKDR_Generic Trend Micro BackDoor.Pigeon.23332
BKDR_Generic Trend Micro Trojan.MulDrop.16913
BKDR_Generic Trend Micro BackDoor.Pigeon.23338
BKDR_Generic Trend Micro Trojan.DownLoader.18483
BKDR_Generic Trend Micro Trojan.Razor.2041
BKDR_Generic Trend Micro BackDoor.Iroffer.1324
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.1042
BKDR_Generic Trend Micro Trojan.AVKill.140
BKDR_Generic Trend Micro Trojan.Starter.143
BKDR_Generic Trend Micro BackDoor.IRC.Juden
BKDR_Generic Trend Micro BackDoor.Smith
BKDR_Generic Trend Micro BackDoor.R3C.149

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.