Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_Generic aliases:

Name Vendor Dr.Web classification name
BKDR_Generic Trend Micro Trojan.Click.17573
BKDR_Generic Trend Micro BackDoor.Pigeon.11560
BKDR_Generic Trend Micro BackDoor.Bifrost.813
BKDR_Generic Trend Micro BackDoor.Bifrost.815
BKDR_Generic Trend Micro BackDoor.Bifrost.864
BKDR_Generic Trend Micro BackDoor.Pigeon.3937
BKDR_Generic Trend Micro BackDoor.Pablos
BKDR_Generic Trend Micro BackDoor.NetDevil.18
BKDR_Generic Trend Micro BackDoor.Siggen.716
BKDR_Generic Trend Micro BackDoor.BioNet.314
BKDR_Generic Trend Micro BackDoor.BlackHole.origin
BKDR_Generic Trend Micro BackDoor.Tranzi.10
BKDR_Generic Trend Micro Trojan.MulDrop.14880
BKDR_Generic Trend Micro Trojan.Spambot.2895
BKDR_Generic Trend Micro Win32.HLLW.MyBot.5675
BKDR_Generic Trend Micro Win32.HLLW.MyBot.5630
BKDR_Generic Trend Micro BackDoor.Pigeon.10876
BKDR_Generic Trend Micro BackDoor.Pigeon.9707
BKDR_Generic Trend Micro BackDoor.Attack.29
BKDR_Generic Trend Micro BackDoor.Yeah
BKDR_Generic Trend Micro BackDoor.Pigeon.3437
BKDR_Generic Trend Micro BackDoor.Pigeon.18881
BKDR_Generic Trend Micro Trojan.Proxy.2760
BKDR_Generic Trend Micro BackDoor.Xof
BKDR_Generic Trend Micro DownLoader.Generator
BKDR_Generic Trend Micro Trojan.DownLoader.53202
BKDR_Generic Trend Micro Trojan.DownLoader.26123
BKDR_Generic Trend Micro BackDoor.Cshell
BKDR_Generic Trend Micro BackDoor.Siggen.470
BKDR_Generic Trend Micro BackDoor.Beizhu.212
BKDR_Generic Trend Micro BackDoor.Siggen.466
BKDR_Generic Trend Micro BackDoor.Siggen.479
BKDR_Generic Trend Micro BackDoor.Siggen.454
BKDR_Generic Trend Micro BackDoor.Abacab.102
BKDR_Generic Trend Micro DDoS.Keznet
BKDR_Generic Trend Micro BackDoor.Pigeon.13089
BKDR_Generic Trend Micro BackDoor.Harvester.66
BKDR_Generic Trend Micro BackDoor.Generic.927
BKDR_Generic Trend Micro Trojan.Cmdbind
BKDR_Generic Trend Micro BackDoor.King.63
BKDR_Generic Trend Micro Trojan.Click.17580
BKDR_Generic Trend Micro BackDoor.Bifrost.945
BKDR_Generic Trend Micro BackDoor.DarkMoon.74
BKDR_Generic Trend Micro Trojan.DownLoader.54612
BKDR_Generic Trend Micro BackDoor.Nuclear.15
BKDR_Generic Trend Micro Trojan.NtRootKit.40
BKDR_Generic Trend Micro Program.Supervisor
BKDR_Generic Trend Micro BackDoor.Punt
BKDR_Generic Trend Micro Trojan.Virtumod.240
BKDR_Generic Trend Micro BackDoor.Stigma

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.