Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_Generic aliases:

Name Vendor Dr.Web classification name
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.3567
BKDR_Generic Trend Micro BackDoor.Iroffer.1312
BKDR_Generic Trend Micro BackDoor.Fenix
BKDR_Generic Trend Micro BackDoor.ProRat.381
BKDR_Generic Trend Micro Trojan.Mutastik.1224
BKDR_Generic Trend Micro BackDoor.ProRat.383
BKDR_Generic Trend Micro Trojan.Mutastik.1211
BKDR_Generic Trend Micro BackDoor.Poison.862
BKDR_Generic Trend Micro BackDoor.Nuclearat.83
BKDR_Generic Trend Micro BackDoor.MagicLink.21
BKDR_Generic Trend Micro Trojan.DownLoader.13449
BKDR_Generic Trend Micro BackDoor.Liux
BKDR_Generic Trend Micro Trojan.Ideo
BKDR_Generic Trend Micro BackDoor.Pigeon.13451
BKDR_Generic Trend Micro BackDoor.Pigeon.215
BKDR_Generic Trend Micro BackDoor.Pigeon.9893
BKDR_Generic Trend Micro BackDoor.Pigeon.130
BKDR_Generic Trend Micro BackDoor.Pigeon.2381
BKDR_Generic Trend Micro Win32.Alman.1
BKDR_Generic Trend Micro Win32.HLLW.Usbmon
BKDR_Generic Trend Micro Trojan.MulDrop.3490
BKDR_Generic Trend Micro BackDoor.Anew
BKDR_Generic Trend Micro BackDoor.Danton.40
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.650
BKDR_Generic Trend Micro BackDoor.Huai.1029
BKDR_Generic Trend Micro Trojan.DownLoader.60627
BKDR_Generic Trend Micro Win32.HLLM.MyDoom.114
BKDR_Generic Trend Micro Trojan.LydraSpy.1392
BKDR_Generic Trend Micro BackDoor.Dumaru.18
BKDR_Generic Trend Micro Win32.HLLW.Cent.45
BKDR_Generic Trend Micro BackDoor.Pigeon.518
BKDR_Generic Trend Micro BackDoor.Pigeon.4912
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.80
BKDR_Generic Trend Micro Trojan.KeyLogger.490
BKDR_Generic Trend Micro BackDoor.Pigeon.25012
BKDR_Generic Trend Micro Win32.HLLW.Autoruner.1541
BKDR_Generic Trend Micro BackDoor.Bifrost.906
BKDR_Generic Trend Micro Win32.HLLW.Zief
BKDR_Generic Trend Micro Trojan.Click.1235
BKDR_Generic Trend Micro BackDoor.Pigeon.305
BKDR_Generic Trend Micro Trojan.PWS.Wsgame.9538
BKDR_Generic Trend Micro Win32.HLLW.MyBot.2
BKDR_Generic Trend Micro BackDoor.BlackHole.2133
BKDR_Generic Trend Micro Trojan.DownLoader.15707
BKDR_Generic Trend Micro Trojan.DownLoad.38179
BKDR_Generic Trend Micro Win32.HLLW.Sodoku
BKDR_Generic Trend Micro Trojan.MulDrop.11134
BKDR_Generic Trend Micro Trojan.MulDrop.6170
BKDR_Generic Trend Micro Trojan.Sharer.20
BKDR_Generic Trend Micro BackDoor.Pigeon.2732

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.