Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_Generic aliases:

Name Vendor Dr.Web classification name
BKDR_Generic Trend Micro BackDoor.HackDef.493
BKDR_Generic Trend Micro BackDoor.Pigeon.23327
BKDR_Generic Trend Micro BackDoor.Ginwui
BKDR_Generic Trend Micro BackDoor.BO2k
BKDR_Generic Trend Micro BackDoor.Pigeon.9267
BKDR_Generic Trend Micro BackDoor.Generic.1226
BKDR_Generic Trend Micro Trojan.Click.16902
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.2895
BKDR_Generic Trend Micro Trojan.MulDrop.11044
BKDR_Generic Trend Micro Trojan.MulDrop.13820
BKDR_Generic Trend Micro BackDoor.Pigeon.8997
BKDR_Generic Trend Micro Trojan.Proxy.659
BKDR_Generic Trend Micro Trojan.Click.24426
BKDR_Generic Trend Micro Trojan.DownLoader.52513
BKDR_Generic Trend Micro Trojan.DownLoad.8807
BKDR_Generic Trend Micro BackDoor.Marjin
BKDR_Generic Trend Micro Win32.HLLW.Autoruner.15789
BKDR_Generic Trend Micro Trojan.MulDrop.6888
BKDR_Generic Trend Micro Trojan.KeyLogger.2191
BKDR_Generic Trend Micro BackDoor.Pigeon.334
BKDR_Generic Trend Micro BackDoor.Huai.2731
BKDR_Generic Trend Micro BackDoor.Pigeon.9815
BKDR_Generic Trend Micro Trojan.NtRootKit.899
BKDR_Generic Trend Micro BackDoor.Huai.575
BKDR_Generic Trend Micro BackDoor.Ferat.10
BKDR_Generic Trend Micro BackDoor.Redgirl.4
BKDR_Generic Trend Micro BackDoor.Pigeon.2280
BKDR_Generic Trend Micro BackDoor.Spook.125
BKDR_Generic Trend Micro BackDoor.Pigeon.129
BKDR_Generic Trend Micro BackDoor.Pigeon.2253
BKDR_Generic Trend Micro Trojan.Click.4669
BKDR_Generic Trend Micro BackDoor.BlackHole.2183
BKDR_Generic Trend Micro BackDoor.Pigeon.1021
BKDR_Generic Trend Micro BackDoor.Bifrost.845
BKDR_Generic Trend Micro BackDoor.NetDevil.15
BKDR_Generic Trend Micro BackDoor.Terrorist.131
BKDR_Generic Trend Micro BackDoor.CrazyNet.521
BKDR_Generic Trend Micro BackDoor.BlackHole.2052
BKDR_Generic Trend Micro Trojan.Isbar.532
BKDR_Generic Trend Micro Trojan.Click.17794
BKDR_Generic Trend Micro Trojan.Isbar.534
BKDR_Generic Trend Micro BackDoor.Beizhu.266
BKDR_Generic Trend Micro BackDoor.Pigeon.2800
BKDR_Generic Trend Micro Win32.IRC.Bot.232
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.3042
BKDR_Generic Trend Micro BackDoor.Antiden
BKDR_Generic Trend Micro BackDoor.Kuchong
BKDR_Generic Trend Micro BackDoor.Bifrost.846
BKDR_Generic Trend Micro BackDoor.Bifrost.792
BKDR_Generic Trend Micro BackDoor.Relback.2

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.