Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_Generic aliases:

Name Vendor Dr.Web classification name
BKDR_Generic Trend Micro BackDoor.Relback.2
BKDR_Generic Trend Micro BackDoor.Weby.29
BKDR_Generic Trend Micro BackDoor.FireOn.44
BKDR_Generic Trend Micro BackDoor.Small.4
BKDR_Generic Trend Micro Trojan.Ranky.40457
BKDR_Generic Trend Micro Trojan.NtRootKit.387
BKDR_Generic Trend Micro Trojan.Punsher
BKDR_Generic Trend Micro BackDoor.Bureau.11
BKDR_Generic Trend Micro Trojan.DownLoader.50681
BKDR_Generic Trend Micro BackDoor.Pigeon.13305
BKDR_Generic Trend Micro BackDoor.Optix.157
BKDR_Generic Trend Micro BackDoor.Servu.75
BKDR_Generic Trend Micro Trojan.Proxy.2790
BKDR_Generic Trend Micro Trojan.DownLoader.59961
BKDR_Generic Trend Micro Trojan.MulDrop.14740
BKDR_Generic Trend Micro BackDoor.Pigeon.2200
BKDR_Generic Trend Micro BackDoor.Inicio
BKDR_Generic Trend Micro BackDoor.Pigeon.2386
BKDR_Generic Trend Micro Trojan.DownLoader.37581
BKDR_Generic Trend Micro BackDoor.ProRat.397
BKDR_Generic Trend Micro BackDoor.IRC.Palin
BKDR_Generic Trend Micro Trojan.DownLoader.6932
BKDR_Generic Trend Micro BackDoor.Generic.1285
BKDR_Generic Trend Micro BackDoor.Pigeon.2238
BKDR_Generic Trend Micro BackDoor.Pigeon.5646
BKDR_Generic Trend Micro Trojan.Starter.520
BKDR_Generic Trend Micro Trojan.DownLoader.22286
BKDR_Generic Trend Micro Trojan.Siggen.34
BKDR_Generic Trend Micro BackDoor.Goldser
BKDR_Generic Trend Micro BackDoor.Generic.680
BKDR_Generic Trend Micro Trojan.PWS.Banker.5101
BKDR_Generic Trend Micro Trojan.Simpbind
BKDR_Generic Trend Micro Trojan.MulDrop.8658
BKDR_Generic Trend Micro Trojan.Sklog
BKDR_Generic Trend Micro BackDoor.Pigeon.6210
BKDR_Generic Trend Micro Trojan.PWS.Gamania.11835
BKDR_Generic Trend Micro Trojan.MulDrop.11308
BKDR_Generic Trend Micro Win32.HLLW.Dao
BKDR_Generic Trend Micro Trojan.MulDrop.4234
BKDR_Generic Trend Micro Trojan.Packed.472
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.3297
BKDR_Generic Trend Micro BackDoor.Swz
BKDR_Generic Trend Micro BackDoor.Huai.790
BKDR_Generic Trend Micro BackDoor.Huai.2810
BKDR_Generic Trend Micro BackDoor.Nuclearat.83
BKDR_Generic Trend Micro BackDoor.Liux
BKDR_Generic Trend Micro BackDoor.Pigeon.2381
BKDR_Generic Trend Micro Trojan.DownLoader.60627
BKDR_Generic Trend Micro BackDoor.Pigeon.4912
BKDR_Generic Trend Micro BackDoor.Pigeon.25012

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.