Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_Generic aliases:

Name Vendor Dr.Web classification name
BKDR_Generic Trend Micro Trojan.MulDrop.14880
BKDR_Generic Trend Micro Trojan.Spambot.2895
BKDR_Generic Trend Micro Win32.HLLW.MyBot.5552
BKDR_Generic Trend Micro Win32.HLLW.MyBot.5675
BKDR_Generic Trend Micro Win32.HLLW.MyBot.5630
BKDR_Generic Trend Micro Win32.HLLW.MyBot.5724
BKDR_Generic Trend Micro BackDoor.Pigeon.10876
BKDR_Generic Trend Micro BackDoor.Pigeon.9707
BKDR_Generic Trend Micro BackDoor.Attack.29
BKDR_Generic Trend Micro BackDoor.Yeah
BKDR_Generic Trend Micro Win32.HLLW.SpyBot.88
BKDR_Generic Trend Micro BackDoor.Pigeon.5320
BKDR_Generic Trend Micro BackDoor.Pigeon.3437
BKDR_Generic Trend Micro BackDoor.Pigeon.18881
BKDR_Generic Trend Micro Trojan.Proxy.2760
BKDR_Generic Trend Micro BackDoor.Remserv
BKDR_Generic Trend Micro BackDoor.Xof
BKDR_Generic Trend Micro Trojan.DownLoader.16150
BKDR_Generic Trend Micro Trojan.PWS.Legmir.1466
BKDR_Generic Trend Micro DownLoader.Generator
BKDR_Generic Trend Micro BackDoor.Protg.104
BKDR_Generic Trend Micro Trojan.DownLoader.53202
BKDR_Generic Trend Micro Trojan.DownLoader.26123
BKDR_Generic Trend Micro BackDoor.Cshell
BKDR_Generic Trend Micro Trojan.PWS.Xuhuan
BKDR_Generic Trend Micro BackDoor.Pigeon.5365
BKDR_Generic Trend Micro BackDoor.Pigeon.4806
BKDR_Generic Trend Micro BackDoor.Pigeon.10590
BKDR_Generic Trend Micro BackDoor.Siggen.455
BKDR_Generic Trend Micro BackDoor.Siggen.470
BKDR_Generic Trend Micro BackDoor.Beizhu.212
BKDR_Generic Trend Micro BackDoor.Siggen.466
BKDR_Generic Trend Micro BackDoor.Siggen.479
BKDR_Generic Trend Micro BackDoor.Siggen.454
BKDR_Generic Trend Micro BackDoor.Abacab.102
BKDR_Generic Trend Micro BackDoor.Generic.729
BKDR_Generic Trend Micro BackDoor.Mist
BKDR_Generic Trend Micro BackDoor.Pigeon.3251
BKDR_Generic Trend Micro DDoS.Keznet
BKDR_Generic Trend Micro BackDoor.Pigeon.13089
BKDR_Generic Trend Micro BackDoor.Harvester.66
BKDR_Generic Trend Micro BackDoor.Generic.927
BKDR_Generic Trend Micro BackDoor.Intruder.11
BKDR_Generic Trend Micro Trojan.PWS.Qqpass.2272
BKDR_Generic Trend Micro Trojan.Cmdbind
BKDR_Generic Trend Micro BackDoor.FireOn
BKDR_Generic Trend Micro BackDoor.King.63
BKDR_Generic Trend Micro Trojan.Click.17580
BKDR_Generic Trend Micro BackDoor.HackDef.157
BKDR_Generic Trend Micro BackDoor.Sksock

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.