Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_Generic aliases:

Name Vendor Dr.Web classification name
BKDR_Generic Trend Micro BackDoor.Pigeon.4821
BKDR_Generic Trend Micro BackDoor.Pigeon.7555
BKDR_Generic Trend Micro BackDoor.Bifrost.941
BKDR_Generic Trend Micro Trojan.PWS.Wsgame.12280
BKDR_Generic Trend Micro BackDoor.Groan
BKDR_Generic Trend Micro BackDoor.Haxdoor.253
BKDR_Generic Trend Micro Trojan.MulDrop.1161
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.2044
BKDR_Generic Trend Micro Trojan.DownLoader.50493
BKDR_Generic Trend Micro Trojan.Proxy.4397
BKDR_Generic Trend Micro BackDoor.Pigeon.11756
BKDR_Generic Trend Micro BackDoor.BotNet.44
BKDR_Generic Trend Micro BackDoor.Brisa
BKDR_Generic Trend Micro BackDoor.Pigeon.9466
BKDR_Generic Trend Micro Trojan.Antidot.11
BKDR_Generic Trend Micro BackDoor.Dabass
BKDR_Generic Trend Micro Tool.Siggen.2045
BKDR_Generic Trend Micro Tool.Siggen.1930
BKDR_Generic Trend Micro BackDoor.Pigeon.8884
BKDR_Generic Trend Micro BackDoor.Silent.23
BKDR_Generic Trend Micro BackDoor.Igltray
BKDR_Generic Trend Micro BackDoor.GWBoy
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.2671
BKDR_Generic Trend Micro BackDoor.Generic.1353
BKDR_Generic Trend Micro Trojan.PWS.LDPinch.7495
BKDR_Generic Trend Micro Trojan.Starter.518
BKDR_Generic Trend Micro Trojan.DownLoader.63191
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.311
BKDR_Generic Trend Micro BackDoor.Haxdoor.163
BKDR_Generic Trend Micro BackDoor.Haxdoor.222
BKDR_Generic Trend Micro Trojan.DownLoader.10413
BKDR_Generic Trend Micro FDOS.Elots
BKDR_Generic Trend Micro Trojan.Click.47944
BKDR_Generic Trend Micro Trojan.Click.48306
BKDR_Generic Trend Micro Trojan.DownLoader.23672
BKDR_Generic Trend Micro Trojan.DownLoader.2748
BKDR_Generic Trend Micro BackDoor.Generic.966
BKDR_Generic Trend Micro BackDoor.Pigeon.6768
BKDR_Generic Trend Micro Trojan.MulDrop1.5034
BKDR_Generic Trend Micro Win32.IRC.Bot.394
BKDR_Generic Trend Micro Trojan.MulDrop.9318
BKDR_Generic Trend Micro BackDoor.Penumbra
BKDR_Generic Trend Micro BackDoor.Pigeon.170
BKDR_Generic Trend Micro BackDoor.Pigeon.2600
BKDR_Generic Trend Micro Trojan.MulDrop.16283
BKDR_Generic Trend Micro BackDoor.Bifrost.21
BKDR_Generic Trend Micro Win32.HLLW.Autoruner.16105
BKDR_Generic Trend Micro Win32.HLLW.Autoruner.16017
BKDR_Generic Trend Micro Trojan.Starter.466
BKDR_Generic Trend Micro BackDoor.BlackHole.2045

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.