Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_Generic aliases:

Name Vendor Dr.Web classification name
BKDR_Generic Trend Micro Trojan.MulDrop.21078
BKDR_Generic Trend Micro BackDoor.Wotiv
BKDR_Generic Trend Micro BackDoor.Hbeat.150
BKDR_Generic Trend Micro BackDoor.Zerdexe
BKDR_Generic Trend Micro BackDoor.Insti.175
BKDR_Generic Trend Micro Trojan.Isbar.537
BKDR_Generic Trend Micro Trojan.Korazon
BKDR_Generic Trend Micro BackDoor.Pigeon.9150
BKDR_Generic Trend Micro BackDoor.Pigeon.12382
BKDR_Generic Trend Micro BackDoor.Hunter
BKDR_Generic Trend Micro BackDoor.Pigeon.9285
BKDR_Generic Trend Micro BackDoor.Pigeon.1224
BKDR_Generic Trend Micro BackDoor.IrcContact
BKDR_Generic Trend Micro Trojan.MulDrop.6095
BKDR_Generic Trend Micro BackDoor.Pigeon.11939
BKDR_Generic Trend Micro BackDoor.Pigeon.8949
BKDR_Generic Trend Micro Trojan.MulDrop.12939
BKDR_Generic Trend Micro BackDoor.Olimp
BKDR_Generic Trend Micro BackDoor.Raid.31
BKDR_Generic Trend Micro BackDoor.Siggen.381
BKDR_Generic Trend Micro Trojan.MulDrop.6500
BKDR_Generic Trend Micro Trojan.DownLoader.245
BKDR_Generic Trend Micro BackDoor.Beizhu.656
BKDR_Generic Trend Micro BackDoor.Xcontrol.37
BKDR_Generic Trend Micro Trojan.MulDrop.12324
BKDR_Generic Trend Micro BackDoor.BadRat
BKDR_Generic Trend Micro Trojan.PWS.Banker.992
BKDR_Generic Trend Micro BackDoor.Pigeon.8858
BKDR_Generic Trend Micro BackDoor.Pigeon.17481
BKDR_Generic Trend Micro BackDoor.Pigeon.8210
BKDR_Generic Trend Micro Win32.HLLW.MyBot.3788
BKDR_Generic Trend Micro Win32.HLLW.MyBot.3593
BKDR_Generic Trend Micro Win32.HLLW.MyBot.4707
BKDR_Generic Trend Micro Win32.HLLW.MyBot.4706
BKDR_Generic Trend Micro Win32.HLLW.MyBot.3787
BKDR_Generic Trend Micro Win32.HLLW.MyBot.4687
BKDR_Generic Trend Micro Win32.HLLW.MyBot.3413
BKDR_Generic Trend Micro BackDoor.Bifrost.195
BKDR_Generic Trend Micro BackDoor.Pointex
BKDR_Generic Trend Micro Trojan.Proxy.1183
BKDR_Generic Trend Micro BackDoor.Pigeon.8532
BKDR_Generic Trend Micro BackDoor.Pigeon.2234
BKDR_Generic Trend Micro BackDoor.Pigeon.13107
BKDR_Generic Trend Micro BackDoor.BotNet.46
BKDR_Generic Trend Micro Win32.HLLW.MyBot.80
BKDR_Generic Trend Micro BackDoor.Graybird.2015
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.3559
BKDR_Generic Trend Micro BackDoor.Insti.135
BKDR_Generic Trend Micro Trojan.DownLoad.8
BKDR_Generic Trend Micro BackDoor.Bifrost.934

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.