Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_Generic aliases:

Name Vendor Dr.Web classification name
BKDR_Generic Trend Micro Joke.Beep
BKDR_Generic Trend Micro BackDoor.Haxdoor.268
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.64
BKDR_Generic Trend Micro Trojan.DownLoader.49922
BKDR_Generic Trend Micro BackDoor.Siggen.474
BKDR_Generic Trend Micro BackDoor.Siggen.476
BKDR_Generic Trend Micro BackDoor.Bifrost.863
BKDR_Generic Trend Micro BackDoor.Bifrost.834
BKDR_Generic Trend Micro BackDoor.Lanfilt.18
BKDR_Generic Trend Micro Trojan.DownLoader.10946
BKDR_Generic Trend Micro BackDoor.Bifrost.866
BKDR_Generic Trend Micro BackDoor.Bifrost.848
BKDR_Generic Trend Micro BackDoor.Bifrost.835
BKDR_Generic Trend Micro BackDoor.Bifrost.869
BKDR_Generic Trend Micro BackDoor.Bifrost.826
BKDR_Generic Trend Micro BackDoor.Null
BKDR_Generic Trend Micro BackDoor.BloodHound
BKDR_Generic Trend Micro BackDoor.Beizhu.141
BKDR_Generic Trend Micro Trojan.Sotai
BKDR_Generic Trend Micro BackDoor.Norton
BKDR_Generic Trend Micro BackDoor.Pigeon.2556
BKDR_Generic Trend Micro BackDoor.Pigeon.1823
BKDR_Generic Trend Micro Trojan.Wihok
BKDR_Generic Trend Micro BackDoor.Lastlo
BKDR_Generic Trend Micro Trojan.DownLoader.54951
BKDR_Generic Trend Micro Trojan.Shua
BKDR_Generic Trend Micro Trojan.Pegan
BKDR_Generic Trend Micro Trojan.Inject.283
BKDR_Generic Trend Micro Trojan.Inject.3020
BKDR_Generic Trend Micro BackDoor.BotNet
BKDR_Generic Trend Micro BackDoor.Bandook.32
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.1962
BKDR_Generic Trend Micro BackDoor.Generic.757
BKDR_Generic Trend Micro Win32.HLLW.Bigga
BKDR_Generic Trend Micro BackDoor.Rcmd
BKDR_Generic Trend Micro Trojan.DownLoader.18377
BKDR_Generic Trend Micro BackDoor.Bifrost.895
BKDR_Generic Trend Micro BackDoor.Biomac
BKDR_Generic Trend Micro Win32.HLLW.MyBot.87
BKDR_Generic Trend Micro BackDoor.Siggen.352
BKDR_Generic Trend Micro Trojan.Spambot.3081
BKDR_Generic Trend Micro BackDoor.RShell
BKDR_Generic Trend Micro BackDoor.Spec
BKDR_Generic Trend Micro BackDoor.Xcontrol.36
BKDR_Generic Trend Micro BackDoor.Xcontrol.354
BKDR_Generic Trend Micro Trojan.DownLoader.23794
BKDR_Generic Trend Micro BackDoor.Optix.56
BKDR_Generic Trend Micro BackDoor.Pigeon.57
BKDR_Generic Trend Micro BackDoor.Nechto
BKDR_Generic Trend Micro Trojan.PWS.Gamania.12323

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.