Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_Generic aliases:

Name Vendor Dr.Web classification name
BKDR_Generic Trend Micro Trojan.Click.17573
BKDR_Generic Trend Micro BackDoor.Pigeon.11560
BKDR_Generic Trend Micro BackDoor.Pigeon.11503
BKDR_Generic Trend Micro BackDoor.Bifrost.815
BKDR_Generic Trend Micro BackDoor.Bifrost.864
BKDR_Generic Trend Micro BackDoor.Pablos
BKDR_Generic Trend Micro BackDoor.NetDevil.18
BKDR_Generic Trend Micro BackDoor.Pigeon.9641
BKDR_Generic Trend Micro BackDoor.BlackHole.origin
BKDR_Generic Trend Micro BackDoor.Tranzi.10
BKDR_Generic Trend Micro Trojan.MulDrop.14880
BKDR_Generic Trend Micro Win32.HLLW.MyBot.5552
BKDR_Generic Trend Micro Win32.HLLW.MyBot.5630
BKDR_Generic Trend Micro BackDoor.Pigeon.10876
BKDR_Generic Trend Micro BackDoor.Pigeon.9707
BKDR_Generic Trend Micro BackDoor.Pigeon.5320
BKDR_Generic Trend Micro BackDoor.Pigeon.3437
BKDR_Generic Trend Micro BackDoor.Pigeon.18881
BKDR_Generic Trend Micro BackDoor.Xof
BKDR_Generic Trend Micro BackDoor.Siggen.455
BKDR_Generic Trend Micro BackDoor.Siggen.454
BKDR_Generic Trend Micro BackDoor.Generic.729
BKDR_Generic Trend Micro BackDoor.Mist
BKDR_Generic Trend Micro DDoS.Keznet
BKDR_Generic Trend Micro BackDoor.Pigeon.13089
BKDR_Generic Trend Micro BackDoor.Harvester.66
BKDR_Generic Trend Micro Trojan.Cmdbind
BKDR_Generic Trend Micro BackDoor.King.63
BKDR_Generic Trend Micro BackDoor.HackDef.157
BKDR_Generic Trend Micro BackDoor.Sksock
BKDR_Generic Trend Micro BackDoor.DarkMoon.74
BKDR_Generic Trend Micro BackDoor.HackDef.495
BKDR_Generic Trend Micro BackDoor.Pigeon.13728
BKDR_Generic Trend Micro Trojan.NtRootKit.40
BKDR_Generic Trend Micro Trojan.MulDrop.7869
BKDR_Generic Trend Micro BackDoor.Omerta
BKDR_Generic Trend Micro BackDoor.Peeper.15
BKDR_Generic Trend Micro BackDoor.JustJoke.26
BKDR_Generic Trend Micro BackDoor.Bifrost.730
BKDR_Generic Trend Micro BackDoor.BlackHole.2109
BKDR_Generic Trend Micro BackDoor.Unilink.8146
BKDR_Generic Trend Micro BackDoor.Pigeon.17500
BKDR_Generic Trend Micro BackDoor.BlackHole.2111
BKDR_Generic Trend Micro BackDoor.BlackHole.2386
BKDR_Generic Trend Micro BackDoor.Siggen.621
BKDR_Generic Trend Micro BackDoor.Attack.98
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.5297
BKDR_Generic Trend Micro BackDoor.Czarny.5
BKDR_Generic Trend Micro BackDoor.Micronet
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.946

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.