Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_Generic aliases:

Name Vendor Dr.Web classification name
BKDR_Generic Trend Micro BackDoor.Bifrost.730
BKDR_Generic Trend Micro BackDoor.BlackHole.2109
BKDR_Generic Trend Micro BackDoor.DarkMoon.41
BKDR_Generic Trend Micro BackDoor.BlackHole.2111
BKDR_Generic Trend Micro BackDoor.BlackHole.2386
BKDR_Generic Trend Micro Trojan.MulDrop.34503
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.946
BKDR_Generic Trend Micro BackDoor.Iprip.6
BKDR_Generic Trend Micro BackDoor.Pigeon.6228
BKDR_Generic Trend Micro Win32.Radix
BKDR_Generic Trend Micro Trojan.Mutastik.1264
BKDR_Generic Trend Micro BackDoor.Caznova.25
BKDR_Generic Trend Micro BackDoor.Nuclear.116
BKDR_Generic Trend Micro BackDoor.Pigeon.7828
BKDR_Generic Trend Micro Trojan.DownLoader.46913
BKDR_Generic Trend Micro BackDoor.Haxdoor.385
BKDR_Generic Trend Micro BackDoor.Pigeon.8810
BKDR_Generic Trend Micro BackDoor.Pigeon.8095
BKDR_Generic Trend Micro BackDoor.Pigeon.34
BKDR_Generic Trend Micro BackDoor.IRC.Rifle
BKDR_Generic Trend Micro Trojan.KeyLogger.592
BKDR_Generic Trend Micro Trojan.MulDrop.15943
BKDR_Generic Trend Micro Trojan.DownLoader.44950
BKDR_Generic Trend Micro BackDoor.Zynber
BKDR_Generic Trend Micro BackDoor.Pigeon.324
BKDR_Generic Trend Micro BackDoor.Pigeon.7580
BKDR_Generic Trend Micro BackDoor.DarkMoon.59
BKDR_Generic Trend Micro BackDoor.Generic.380
BKDR_Generic Trend Micro BackDoor.Havar.111
BKDR_Generic Trend Micro BackDoor.Pigeon.5240
BKDR_Generic Trend Micro BackDoor.Shellc
BKDR_Generic Trend Micro Trojan.Starter.517
BKDR_Generic Trend Micro BackDoor.Pigeon.9363
BKDR_Generic Trend Micro Win32.HLLW.MyBot.331
BKDR_Generic Trend Micro Tool.Pwlgrab
BKDR_Generic Trend Micro Trojan.DownLoader.26515
BKDR_Generic Trend Micro BackDoor.Pigeon.11472
BKDR_Generic Trend Micro Constructor.Siggen.864
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.1689
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.2492
BKDR_Generic Trend Micro Win32.HLLW.Autoruner.15435
BKDR_Generic Trend Micro Win32.HLLW.Autoruner.14857
BKDR_Generic Trend Micro Win32.HLLW.Autoruner.14204
BKDR_Generic Trend Micro Win32.HLLW.Multi
BKDR_Generic Trend Micro BackDoor.Veryfun
BKDR_Generic Trend Micro Win32.HLLW.Imager
BKDR_Generic Trend Micro BackDoor.PcClient.872
BKDR_Generic Trend Micro BackDoor.Pigeon.5144
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.3707
BKDR_Generic Trend Micro BackDoor.Pigeon.9133

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.