Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_Generic aliases:

Name Vendor Dr.Web classification name
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.120
BKDR_Generic Trend Micro Trojan.StartPage.21292
BKDR_Generic Trend Micro BackDoor.Pigeon.13169
BKDR_Generic Trend Micro BackDoor.Attack.23
BKDR_Generic Trend Micro BackDoor.DarkMoon.95
BKDR_Generic Trend Micro BackDoor.VHM.2
BKDR_Generic Trend Micro BackDoor.Huai.799
BKDR_Generic Trend Micro Trojan.Stius.105
BKDR_Generic Trend Micro BackDoor.Bifrost.210
BKDR_Generic Trend Micro BackDoor.M3
BKDR_Generic Trend Micro BackDoor.Pigeon.2440
BKDR_Generic Trend Micro Trojan.PWS.Ran.15
BKDR_Generic Trend Micro Trojan.PWS.Qqpass.199
BKDR_Generic Trend Micro Trojan.Rent
BKDR_Generic Trend Micro Trojan.MulDrop.1343
BKDR_Generic Trend Micro BackDoor.Pigeon.3040
BKDR_Generic Trend Micro BackDoor.Pigeon.9858
BKDR_Generic Trend Micro BackDoor.Bmail
BKDR_Generic Trend Micro BackDoor.Haxdoor.211
BKDR_Generic Trend Micro BackDoor.IRC.Tibia
BKDR_Generic Trend Micro BackDoor.Kurban
BKDR_Generic Trend Micro Trojan.Cipher
BKDR_Generic Trend Micro Trojan.MulDrop.11541
BKDR_Generic Trend Micro Trojan.MulDrop.13690
BKDR_Generic Trend Micro Trojan.MulDrop.15688
BKDR_Generic Trend Micro Trojan.DownLoader.50991
BKDR_Generic Trend Micro Trojan.PWS.Ymagic.15
BKDR_Generic Trend Micro BackDoor.Bifrost.803
BKDR_Generic Trend Micro BackDoor.Nunaks
BKDR_Generic Trend Micro Trojan.MulDrop.7438
BKDR_Generic Trend Micro Trojan.MulDrop.21038
BKDR_Generic Trend Micro Trojan.Inject.365
BKDR_Generic Trend Micro Trojan.Click.17167
BKDR_Generic Trend Micro BackDoor.Wotiv
BKDR_Generic Trend Micro Trojan.NtRootKit.1221
BKDR_Generic Trend Micro BackDoor.Apofis
BKDR_Generic Trend Micro BackDoor.Pomax
BKDR_Generic Trend Micro BackDoor.Insti.211
BKDR_Generic Trend Micro BackDoor.Bifrost.865
BKDR_Generic Trend Micro BackDoor.Insti.175
BKDR_Generic Trend Micro Trojan.MulDrop.1130
BKDR_Generic Trend Micro Trojan.NtRootKit.331
BKDR_Generic Trend Micro Trojan.Isbar.537
BKDR_Generic Trend Micro BackDoor.Bifrost.355
BKDR_Generic Trend Micro BackDoor.Pigeon.2108
BKDR_Generic Trend Micro BackDoor.Pigeon.9150
BKDR_Generic Trend Micro BackDoor.Pigeon.9136
BKDR_Generic Trend Micro Trojan.Proxy.3180
BKDR_Generic Trend Micro BackDoor.Pigeon.12382
BKDR_Generic Trend Micro BackDoor.Bifrost.830

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.