Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_Generic aliases:

Name Vendor Dr.Web classification name
BKDR_Generic Trend Micro BackDoor.Biaoshi
BKDR_Generic Trend Micro BackDoor.Babebit
BKDR_Generic Trend Micro BackDoor.Winlove
BKDR_Generic Trend Micro BackDoor.Blade
BKDR_Generic Trend Micro Trojan.Inject.3277
BKDR_Generic Trend Micro Trojan.Inject.680
BKDR_Generic Trend Micro Trojan.KeyLogger.1965
BKDR_Generic Trend Micro BackDoor.BioNet.261
BKDR_Generic Trend Micro BackDoor.Pigeon.8195
BKDR_Generic Trend Micro Trojan.Proxy.349
BKDR_Generic Trend Micro Trojan.MulDrop.13981
BKDR_Generic Trend Micro Trojan.MulDrop.7435
BKDR_Generic Trend Micro BackDoor.Revenge.522
BKDR_Generic Trend Micro BackDoor.Terminal
BKDR_Generic Trend Micro BackDoor.Pigeon.6447
BKDR_Generic Trend Micro BackDoor.Splinter
BKDR_Generic Trend Micro BackDoor.Zinyth
BKDR_Generic Trend Micro Trojan.Chikan
BKDR_Generic Trend Micro Trojan.Click.18767
BKDR_Generic Trend Micro Trojan.Proxy.621
BKDR_Generic Trend Micro BackDoor.Pigeon.63
BKDR_Generic Trend Micro Trojan.Proxy.2041
BKDR_Generic Trend Micro Trojan.Stius.69
BKDR_Generic Trend Micro Trojan.MulDrop.14958
BKDR_Generic Trend Micro BackDoor.Nogadu
BKDR_Generic Trend Micro BackDoor.Thready
BKDR_Generic Trend Micro Win32.HLLW.Aimal
BKDR_Generic Trend Micro BackDoor.Pigeon.10071
BKDR_Generic Trend Micro Win32.HLLM.Generic.220
BKDR_Generic Trend Micro Trojan.DownLoader.5067
BKDR_Generic Trend Micro BackDoor.IRC.Nafan
BKDR_Generic Trend Micro BackDoor.Huai.5439
BKDR_Generic Trend Micro BackDoor.Huai.5469
BKDR_Generic Trend Micro Trojan.DownLoader.39190
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.2158
BKDR_Generic Trend Micro Program.mIRC.603
BKDR_Generic Trend Micro Win32.HLLW.MyBot.90
BKDR_Generic Trend Micro Trojan.Siggen.3439
BKDR_Generic Trend Micro Trojan.DownLoader.4269
BKDR_Generic Trend Micro Trojan.Sinop
BKDR_Generic Trend Micro Trojan.MulDrop.1219
BKDR_Generic Trend Micro BackDoor.Generic.328
BKDR_Generic Trend Micro BackDoor.Gage
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.561
BKDR_Generic Trend Micro BackDoor.Beizhu.621
BKDR_Generic Trend Micro BackDoor.CmjSpy.10
BKDR_Generic Trend Micro BackDoor.Optix.168
BKDR_Generic Trend Micro DDoS.Iojik
BKDR_Generic Trend Micro BackDoor.HackDef.134
BKDR_Generic Trend Micro BackDoor.Suicide

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.