Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_Generic aliases:

Name Vendor Dr.Web classification name
BKDR_Generic Trend Micro BackDoor.Pigeon.8095
BKDR_Generic Trend Micro BackDoor.Pigeon.34
BKDR_Generic Trend Micro BackDoor.Nobse
BKDR_Generic Trend Micro BackDoor.Dumaru.3
BKDR_Generic Trend Micro BackDoor.Pigeon.7640
BKDR_Generic Trend Micro BackDoor.IRC.Rifle
BKDR_Generic Trend Micro Trojan.Click.18897
BKDR_Generic Trend Micro BackDoor.Xbot.44
BKDR_Generic Trend Micro Trojan.Proxy.3260
BKDR_Generic Trend Micro Trojan.MulDrop.2904
BKDR_Generic Trend Micro Trojan.KeyLogger.592
BKDR_Generic Trend Micro Trojan.DownLoader.11922
BKDR_Generic Trend Micro Trojan.Fwex
BKDR_Generic Trend Micro BackDoor.Haxdoor.337
BKDR_Generic Trend Micro BackDoor.Jeff
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.1460
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.2282
BKDR_Generic Trend Micro BackDoor.Netsata
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.2274
BKDR_Generic Trend Micro Trojan.MulDrop.15943
BKDR_Generic Trend Micro BackDoor.Pigeon.8400
BKDR_Generic Trend Micro Trojan.DownLoader.44950
BKDR_Generic Trend Micro BackDoor.BlackHole.2005
BKDR_Generic Trend Micro BackDoor.Nocker
BKDR_Generic Trend Micro BackDoor.IRC.Cybix
BKDR_Generic Trend Micro Win32.HLLW.SpyBot.98
BKDR_Generic Trend Micro BackDoor.Haxdoor.321
BKDR_Generic Trend Micro Trojan.Proxy.906
BKDR_Generic Trend Micro BackDoor.Mirshell
BKDR_Generic Trend Micro Trojan.PWS.Banker.16380
BKDR_Generic Trend Micro BackDoor.Zynber
BKDR_Generic Trend Micro BackDoor.Pigeon.324
BKDR_Generic Trend Micro Trojan.DownLoader.59960
BKDR_Generic Trend Micro BackDoor.Cinsock
BKDR_Generic Trend Micro BackDoor.AcidBatt
BKDR_Generic Trend Micro BackDoor.Pigeon.7580
BKDR_Generic Trend Micro BackDoor.DarkMoon.59
BKDR_Generic Trend Micro Trojan.Xor
BKDR_Generic Trend Micro Trojan.DownLoader.38445
BKDR_Generic Trend Micro BackDoor.Huai.2031
BKDR_Generic Trend Micro BackDoor.CmjSpy.24
BKDR_Generic Trend Micro Trojan.MulDrop.735
BKDR_Generic Trend Micro BackDoor.Siggen.658
BKDR_Generic Trend Micro BackDoor.Generic.380
BKDR_Generic Trend Micro BackDoor.Havar.111
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.2984
BKDR_Generic Trend Micro BackDoor.Pigeon.8171
BKDR_Generic Trend Micro BackDoor.Pigeon.437
BKDR_Generic Trend Micro BackDoor.Ultra
BKDR_Generic Trend Micro BackDoor.Pigeon.5240

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.