Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_Generic aliases:

Name Vendor Dr.Web classification name
BKDR_Generic Trend Micro BackDoor.Huai.2034
BKDR_Generic Trend Micro BackDoor.YAT.15
BKDR_Generic Trend Micro BackDoor.Pigeon.8746
BKDR_Generic Trend Micro BackDoor.Chax
BKDR_Generic Trend Micro BackDoor.Huai.2335
BKDR_Generic Trend Micro BackDoor.Pigeon.6154
BKDR_Generic Trend Micro BackDoor.Death.408
BKDR_Generic Trend Micro BackDoor.Generic.1467
BKDR_Generic Trend Micro BackDoor.Iroffer.1250
BKDR_Generic Trend Micro BackDoor.Pigeon.3972
BKDR_Generic Trend Micro BackDoor.Pigeon.11891
BKDR_Generic Trend Micro BackDoor.Pigeon.12048
BKDR_Generic Trend Micro BackDoor.Pigeon.9819
BKDR_Generic Trend Micro Trojan.MulDrop.16496
BKDR_Generic Trend Micro Trojan.Starter.519
BKDR_Generic Trend Micro Trojan.MulDrop.16501
BKDR_Generic Trend Micro Trojan.MulDrop.15019
BKDR_Generic Trend Micro BackDoor.Pablos.27
BKDR_Generic Trend Micro BackDoor.AnFTP.4
BKDR_Generic Trend Micro BackDoor.Gimmie
BKDR_Generic Trend Micro BackDoor.Gst.15
BKDR_Generic Trend Micro BackDoor.Radmin.22
BKDR_Generic Trend Micro BackDoor.IRC.Realop
BKDR_Generic Trend Micro Adware.Cinmus.535
BKDR_Generic Trend Micro BackDoor.Pigeon.12343
BKDR_Generic Trend Micro Trojan.KillFiles.11323
BKDR_Generic Trend Micro BackDoor.Huai.437
BKDR_Generic Trend Micro Trojan.DownLoader.51140
BKDR_Generic Trend Micro Trojan.MulDrop.9674
BKDR_Generic Trend Micro Trojan.MulDrop.6143
BKDR_Generic Trend Micro Trojan.Inject.5373
BKDR_Generic Trend Micro Trojan.PWS.Lurker
BKDR_Generic Trend Micro BackDoor.CmjSpy.92
BKDR_Generic Trend Micro BackDoor.Kbe
BKDR_Generic Trend Micro BackDoor.Latinus
BKDR_Generic Trend Micro Trojan.Ranky.40489
BKDR_Generic Trend Micro BackDoor.Pigeon.21713
BKDR_Generic Trend Micro BackDoor.Pigeon.7550
BKDR_Generic Trend Micro BackDoor.HackDef.203
BKDR_Generic Trend Micro BackDoor.Ghost.95
BKDR_Generic Trend Micro BackDoor.Confi
BKDR_Generic Trend Micro Trojan.Proxy.463
BKDR_Generic Trend Micro BackDoor.Pigeon.6599
BKDR_Generic Trend Micro BackDoor.Infector.2004
BKDR_Generic Trend Micro Program.RemoteAdmin.47
BKDR_Generic Trend Micro BackDoor.Bureau.12
BKDR_Generic Trend Micro BackDoor.Beizhu.988
BKDR_Generic Trend Micro Trojan.DownLoader.24967
BKDR_Generic Trend Micro Trojan.Spambot.3272
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.637

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.