Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_Generic aliases:

Name Vendor Dr.Web classification name
BKDR_Generic Trend Micro BackDoor.Goldser
BKDR_Generic Trend Micro BackDoor.Generic.680
BKDR_Generic Trend Micro Trojan.Simpbind
BKDR_Generic Trend Micro Trojan.MulDrop.8658
BKDR_Generic Trend Micro Trojan.MulDrop.8983
BKDR_Generic Trend Micro BackDoor.Pigeon.8340
BKDR_Generic Trend Micro BackDoor.Pigeon.9834
BKDR_Generic Trend Micro BackDoor.Generic.134
BKDR_Generic Trend Micro BackDoor.Generic.373
BKDR_Generic Trend Micro BackDoor.Generic.1506
BKDR_Generic Trend Micro BackDoor.Beizhu.267
BKDR_Generic Trend Micro BackDoor.Attack.32
BKDR_Generic Trend Micro BackDoor.Iroffer.1312
BKDR_Generic Trend Micro BackDoor.Nuclearat.83
BKDR_Generic Trend Micro Trojan.Ideo
BKDR_Generic Trend Micro BackDoor.Pigeon.130
BKDR_Generic Trend Micro BackDoor.Anew
BKDR_Generic Trend Micro BackDoor.Danton.40
BKDR_Generic Trend Micro BackDoor.Pigeon.4912
BKDR_Generic Trend Micro Win32.HLLW.Autoruner.1541
BKDR_Generic Trend Micro Win32.HLLW.MyBot.2
BKDR_Generic Trend Micro Trojan.MulDrop.11134
BKDR_Generic Trend Micro Trojan.MulDrop.6170
BKDR_Generic Trend Micro Trojan.MulDrop.12937
BKDR_Generic Trend Micro BackDoor.Loka
BKDR_Generic Trend Micro BackDoor.Pigeon.11473
BKDR_Generic Trend Micro BackDoor.Pigeon.9137
BKDR_Generic Trend Micro Trojan.Packed.561
BKDR_Generic Trend Micro BackDoor.Katzu
BKDR_Generic Trend Micro BackDoor.CmjSpy.118
BKDR_Generic Trend Micro BackDoor.Rtb.16
BKDR_Generic Trend Micro BackDoor.Rtb.15
BKDR_Generic Trend Micro Trojan.DownLoader.17798
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.1988
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.654
BKDR_Generic Trend Micro BackDoor.Skd.20
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.3111
BKDR_Generic Trend Micro Trojan.Konsocks.9
BKDR_Generic Trend Micro Win32.HLLW.MyBot.5802
BKDR_Generic Trend Micro BackDoor.DarkMoon.84
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.2066
BKDR_Generic Trend Micro BackDoor.Pigeon.11719
BKDR_Generic Trend Micro BackDoor.Pigeon.11893
BKDR_Generic Trend Micro Trojan.Stius
BKDR_Generic Trend Micro BackDoor.Mian
BKDR_Generic Trend Micro BackDoor.Xhx.160
BKDR_Generic Trend Micro BackDoor.Optix.56
BKDR_Generic Trend Micro BackDoor.Pigeon.57
BKDR_Generic Trend Micro BackDoor.Nechto
BKDR_Generic Trend Micro BackDoor.Pigeon.9344

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.