Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_Generic aliases:

Name Vendor Dr.Web classification name
BKDR_Generic Trend Micro BackDoor.Generic.1009
BKDR_Generic Trend Micro BackDoor.Ddoser
BKDR_Generic Trend Micro BackDoor.Attack.33
BKDR_Generic Trend Micro BackDoor.Pigeon.13148
BKDR_Generic Trend Micro BackDoor.Pigeon.13154
BKDR_Generic Trend Micro BackDoor.Pigeon.13033
BKDR_Generic Trend Micro BackDoor.Pigeon.5699
BKDR_Generic Trend Micro Trojan.DownLoader.21028
BKDR_Generic Trend Micro BackDoor.Generic.670
BKDR_Generic Trend Micro BackDoor.Crosbo
BKDR_Generic Trend Micro BackDoor.Medel
BKDR_Generic Trend Micro BackDoor.Haslo
BKDR_Generic Trend Micro BackDoor.Protg.116
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.3450
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.3324
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.135
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.984
BKDR_Generic Trend Micro BackDoor.IRC.Mypoo
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.667
BKDR_Generic Trend Micro BackDoor.Pigeon.24577
BKDR_Generic Trend Micro BackDoor.Bifrost.457
BKDR_Generic Trend Micro BackDoor.Pigeon.3980
BKDR_Generic Trend Micro BackDoor.Pigeon.5068
BKDR_Generic Trend Micro BackDoor.Pigeon.6949
BKDR_Generic Trend Micro Trojan.DownLoader.21105
BKDR_Generic Trend Micro BackDoor.Pigeon.3228
BKDR_Generic Trend Micro Trojan.MulDrop.12181
BKDR_Generic Trend Micro Trojan.MulDrop.10293
BKDR_Generic Trend Micro BackDoor.Rtkit.12
BKDR_Generic Trend Micro Trojan.PWS.Xray
BKDR_Generic Trend Micro BackDoor.Nuclear.28
BKDR_Generic Trend Micro BackDoor.Huai.669
BKDR_Generic Trend Micro BackDoor.Huai.1191
BKDR_Generic Trend Micro BackDoor.Beizhu.1001
BKDR_Generic Trend Micro BackDoor.Huai.981
BKDR_Generic Trend Micro BackDoor.Attack.42
BKDR_Generic Trend Micro BackDoor.HackDef.164
BKDR_Generic Trend Micro Trojan.Proxy.3752
BKDR_Generic Trend Micro Win32.HLLW.MyBot.217
BKDR_Generic Trend Micro Trojan.DownLoader.26661
BKDR_Generic Trend Micro Trojan.DownLoader.12792
BKDR_Generic Trend Micro BackDoor.Pigeon.8367
BKDR_Generic Trend Micro BackDoor.Pigeon.3447
BKDR_Generic Trend Micro Trojan.Ugly.29378
BKDR_Generic Trend Micro Trojan.PWS.Banker.12878
BKDR_Generic Trend Micro Win32.HLLW.Autoruner.1391
BKDR_Generic Trend Micro BackDoor.Chakau.2
BKDR_Generic Trend Micro BackDoor.Generic.494
BKDR_Generic Trend Micro Trojan.DownLoader.54645
BKDR_Generic Trend Micro BackDoor.Generic.1060

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.