Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_Generic aliases:

Name Vendor Dr.Web classification name
BKDR_Generic Trend Micro BackDoor.Beizhu.734
BKDR_Generic Trend Micro BackDoor.Teripsec
BKDR_Generic Trend Micro BackDoor.Beizhu.716
BKDR_Generic Trend Micro Trojan.DownLoader.925
BKDR_Generic Trend Micro BackDoor.Hackdoor.22
BKDR_Generic Trend Micro BackDoor.Beizhu.795
BKDR_Generic Trend Micro BackDoor.PcClient.743
BKDR_Generic Trend Micro BackDoor.TerraBit
BKDR_Generic Trend Micro BackDoor.Broken
BKDR_Generic Trend Micro BackDoor.Zapinit
BKDR_Generic Trend Micro BackDoor.Generic.1226
BKDR_Generic Trend Micro BackDoor.Yanlis
BKDR_Generic Trend Micro Win32.HLLW.Autoruner.3345
BKDR_Generic Trend Micro Tool.Gina.1
BKDR_Generic Trend Micro BackDoor.Pigeon.8889
BKDR_Generic Trend Micro Trojan.PWS.Ola
BKDR_Generic Trend Micro Trojan.Click.16902
BKDR_Generic Trend Micro BackDoor.Pigeon.11429
BKDR_Generic Trend Micro Trojan.DownLoader.3856
BKDR_Generic Trend Micro Win32.HLLM.Mugem
BKDR_Generic Trend Micro BackDoor.Pazus.20
BKDR_Generic Trend Micro BackDoor.PcClient.614
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.2895
BKDR_Generic Trend Micro BackDoor.Pookmen
BKDR_Generic Trend Micro BackDoor.Bifrost.998
BKDR_Generic Trend Micro BackDoor.Pigeon.7169
BKDR_Generic Trend Micro BackDoor.Pigeon.13338
BKDR_Generic Trend Micro BackDoor.Bifrost.10
BKDR_Generic Trend Micro Trojan.MulDrop.13632
BKDR_Generic Trend Micro Trojan.MulDrop.10875
BKDR_Generic Trend Micro Trojan.MulDrop.15944
BKDR_Generic Trend Micro Trojan.MulDrop.13273
BKDR_Generic Trend Micro Trojan.MulDrop.11044
BKDR_Generic Trend Micro Trojan.MulDrop.13820
BKDR_Generic Trend Micro Trojan.DownLoader.62487
BKDR_Generic Trend Micro Trojan.DownLoader.12354
BKDR_Generic Trend Micro Trojan.PWS.Vipgsm.509
BKDR_Generic Trend Micro Trojan.Hooker.213
BKDR_Generic Trend Micro Trojan.KeyLogger.1608
BKDR_Generic Trend Micro Trojan.DownLoader.7059
BKDR_Generic Trend Micro BackDoor.DarkMoon.68
BKDR_Generic Trend Micro BackDoor.Pigeon.8997
BKDR_Generic Trend Micro Win32.HLLM.Mayday
BKDR_Generic Trend Micro BackDoor.Xdoor.352
BKDR_Generic Trend Micro BackDoor.Inter
BKDR_Generic Trend Micro BackDoor.Pigeon.9304
BKDR_Generic Trend Micro BackDoor.Pigeon.6372
BKDR_Generic Trend Micro BackDoor.Insti.100
BKDR_Generic Trend Micro BackDoor.HackDef.421
BKDR_Generic Trend Micro BackDoor.BlackHole.2078

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.