Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_Generic aliases:

Name Vendor Dr.Web classification name
BKDR_Generic Trend Micro BackDoor.Pigeon.1251
BKDR_Generic Trend Micro BackDoor.Guis
BKDR_Generic Trend Micro BackDoor.EggDrop.1623
BKDR_Generic Trend Micro BackDoor.Pigeon.267
BKDR_Generic Trend Micro BackDoor.Pigeon.775
BKDR_Generic Trend Micro BackDoor.Pigeon.1272
BKDR_Generic Trend Micro BackDoor.Bandook.24
BKDR_Generic Trend Micro BackDoor.FireFly
BKDR_Generic Trend Micro BackDoor.DarkMoon.98
BKDR_Generic Trend Micro BackDoor.SubSeven
BKDR_Generic Trend Micro Trojan.MulDrop.4627
BKDR_Generic Trend Micro BackDoor.Nethief.122
BKDR_Generic Trend Micro BackDoor.IRC.Nameless
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.1144
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.928
BKDR_Generic Trend Micro BackDoor.IRC.Wisdom
BKDR_Generic Trend Micro BackDoor.Pigeon.1277
BKDR_Generic Trend Micro VirusConstructor.Shell
BKDR_Generic Trend Micro Trojan.PWS.Banker.7196
BKDR_Generic Trend Micro Trojan.Starter.169
BKDR_Generic Trend Micro BackDoor.Pigeon.194
BKDR_Generic Trend Micro Trojan.Spambot
BKDR_Generic Trend Micro Trojan.DownLoader.19589
BKDR_Generic Trend Micro BackDoor.Zenmaster.103
BKDR_Generic Trend Micro BackDoor.Pigeon.1545
BKDR_Generic Trend Micro Trojan.PWS.Kpo
BKDR_Generic Trend Micro BackDoor.Pigeon.1267
BKDR_Generic Trend Micro BackDoor.Pigeon.1597
BKDR_Generic Trend Micro BackDoor.Pigeon.1598
BKDR_Generic Trend Micro BackDoor.IRC.Ohzi
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot
BKDR_Generic Trend Micro BackDoor.Pigeon.1613
BKDR_Generic Trend Micro Trojan.Mutastik
BKDR_Generic Trend Micro BackDoor.Haxdoor.362
BKDR_Generic Trend Micro BackDoor.Pigeon.1604
BKDR_Generic Trend Micro Win32.HLLW.MyBot.based
BKDR_Generic Trend Micro BackDoor.Pigeon.1562
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.1225
BKDR_Generic Trend Micro Trojan.Proxy.1082
BKDR_Generic Trend Micro BackDoor.Nerte.720
BKDR_Generic Trend Micro Program.ServUServer
BKDR_Generic Trend Micro Trojan.MulDrop.2220
BKDR_Generic Trend Micro BackDoor.Pigeon.610
BKDR_Generic Trend Micro Trojan.PWS.Gamania
BKDR_Generic Trend Micro BackDoor.Doebyt
BKDR_Generic Trend Micro BackDoor.Pigeon.1352
BKDR_Generic Trend Micro Trojan.FuRootkit
BKDR_Generic Trend Micro Trojan.PWS.Vipgsm
BKDR_Generic Trend Micro BackDoor.UandMe.30
BKDR_Generic Trend Micro BackDoor.Masteseq

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.