Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_Generic.DIT aliases:

Name Vendor Dr.Web classification name
BKDR_Generic.DIT Trend Micro Trojan.MulDrop.2368
BKDR_Generic.DIT Trend Micro Trojan.MulDrop.14785
BKDR_Generic.DIT Trend Micro Trojan.MulDrop.18956
BKDR_Generic.DIT Trend Micro Trojan.DownLoader.11924
BKDR_Generic.DIT Trend Micro Trojan.KeyLogger.2331
BKDR_Generic.DIT Trend Micro BackDoor.Zrat
BKDR_Generic.DIT Trend Micro Trojan.MulDrop.35374
BKDR_Generic.DIT Trend Micro Trojan.MulDrop.14080
BKDR_Generic.DIT Trend Micro BackDoor.Update.19
BKDR_Generic.DIT Trend Micro BackDoor.Guptachar.20
BKDR_Generic.DIT Trend Micro Win32.HLLW.Lime.3
BKDR_Generic.DIT Trend Micro Tool.Transmit
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.6767
BKDR_Generic.DIT Trend Micro Trojan.DownLoader.20879
BKDR_Generic.DIT Trend Micro Trojan.Packed.2446
BKDR_Generic.DIT Trend Micro Trojan.Botnetlog.11
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.21843
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.19150
BKDR_Generic.DIT Trend Micro BackDoor.Bifrost
BKDR_Generic.DIT Trend Micro BackDoor.IRC.Sdbot.4939
BKDR_Generic.DIT Trend Micro Trojan.MulDrop.9674
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.8448
BKDR_Generic.DIT Trend Micro Trojan.Inject.549
BKDR_Generic.DIT Trend Micro Trojan.PWS.Hukle.76
BKDR_Generic.DIT Trend Micro Win32.HLLW.Ofni
BKDR_Generic.DIT Trend Micro Trojan.PWS.Ola.60
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.22135
BKDR_Generic.DIT Trend Micro Trojan.DownLoader.24862
BKDR_Generic.DIT Trend Micro Exploit.DCom.12
BKDR_Generic.DIT Trend Micro Trojan.AVKill.446
BKDR_Generic.DIT Trend Micro Trojan.MulDrop.11134
BKDR_Generic.DIT Trend Micro BackDoor.ProRat.252
BKDR_Generic.DIT Trend Micro BackDoor.IRC.Nite.18
BKDR_Generic.DIT Trend Micro BackDoor.Beizhu.2377
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.17504
BKDR_Generic.DIT Trend Micro BackDoor.Huai.4744
BKDR_Generic.DIT Trend Micro BackDoor.Beizhu.995
BKDR_Generic.DIT Trend Micro BackDoor.Bifrost.817
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.20445
BKDR_Generic.DIT Trend Micro BackDoor.Nethief.146
BKDR_Generic.DIT Trend Micro Trojan.Packed.200
BKDR_Generic.DIT Trend Micro Trojan.DownLoad.42005
BKDR_Generic.DIT Trend Micro Trojan.DownLoader.26661
BKDR_Generic.DIT Trend Micro Trojan.MulDrop.13727
BKDR_Generic.DIT Trend Micro Trojan.MulDrop.12426
BKDR_Generic.DIT Trend Micro Win32.HLLW.MyBot.239
BKDR_Generic.DIT Trend Micro Trojan.MulDrop.15004
BKDR_Generic.DIT Trend Micro Trojan.MulDrop.16281
BKDR_Generic.DIT Trend Micro BackDoor.Bifrost.816
BKDR_Generic.DIT Trend Micro BackDoor.Tdss.165

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.