Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_Generic.DIT aliases:

Name Vendor Dr.Web classification name
BKDR_Generic.DIT Trend Micro BackDoor.Huai.3139
BKDR_Generic.DIT Trend Micro Trojan.Proxy.3766
BKDR_Generic.DIT Trend Micro Trojan.MulDrop.7126
BKDR_Generic.DIT Trend Micro Trojan.DownLoad.42249
BKDR_Generic.DIT Trend Micro BackDoor.Bifrost.58
BKDR_Generic.DIT Trend Micro BackDoor.Bifrost.60
BKDR_Generic.DIT Trend Micro Trojan.DownLoad.42272
BKDR_Generic.DIT Trend Micro Trojan.DownLoader.48880
BKDR_Generic.DIT Trend Micro BackDoor.IRC.Sdbot.4905
BKDR_Generic.DIT Trend Micro BackDoor.IRC.Sdbot.4906
BKDR_Generic.DIT Trend Micro Win32.HLLW.Autoruner.2355
BKDR_Generic.DIT Trend Micro BackDoor.IRC.Drizand
BKDR_Generic.DIT Trend Micro Trojan.Siggen.4307
BKDR_Generic.DIT Trend Micro Trojan.Smoking.13
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.3166
BKDR_Generic.DIT Trend Micro BackDoor.Bifrost.176
BKDR_Generic.DIT Trend Micro BackDoor.Bifrost.849
BKDR_Generic.DIT Trend Micro Trojan.PWS.Swz
BKDR_Generic.DIT Trend Micro BackDoor.Huai.3206
BKDR_Generic.DIT Trend Micro BackDoor.IRC.Rxbot.15
BKDR_Generic.DIT Trend Micro Trojan.Freed
BKDR_Generic.DIT Trend Micro Trojan.Click.17636
BKDR_Generic.DIT Trend Micro Win32.HLLW.Autoruner.15958
BKDR_Generic.DIT Trend Micro Trojan.NtRootKit.353
BKDR_Generic.DIT Trend Micro Trojan.Siggen.62570
BKDR_Generic.DIT Trend Micro Trojan.Siggen.59606
BKDR_Generic.DIT Trend Micro BackDoor.Update.56
BKDR_Generic.DIT Trend Micro BackDoor.Siggen.685
BKDR_Generic.DIT Trend Micro BackDoor.DnsDoor
BKDR_Generic.DIT Trend Micro BackDoor.Klj.157
BKDR_Generic.DIT Trend Micro Trojan.PWS.Legmir.386
BKDR_Generic.DIT Trend Micro Trojan.Packed.2362
BKDR_Generic.DIT Trend Micro BackDoor.IcqKnock.24
BKDR_Generic.DIT Trend Micro FDOS.Atomix.30
BKDR_Generic.DIT Trend Micro Trojan.DownLoader.48978
BKDR_Generic.DIT Trend Micro Trojan.Spambot.3554
BKDR_Generic.DIT Trend Micro Trojan.Spambot.3352
BKDR_Generic.DIT Trend Micro Trojan.Spambot.4615
BKDR_Generic.DIT Trend Micro Trojan.MulDrop.34620
BKDR_Generic.DIT Trend Micro BackDoor.Poison.198
BKDR_Generic.DIT Trend Micro Trojan.NtRootKit.1257
BKDR_Generic.DIT Trend Micro BackDoor.IRC.Sdbot.838
BKDR_Generic.DIT Trend Micro Trojan.Proxy.3103
BKDR_Generic.DIT Trend Micro Trojan.MulDrop.3027
BKDR_Generic.DIT Trend Micro Trojan.Shark.810
BKDR_Generic.DIT Trend Micro Trojan.KeyLogger.88
BKDR_Generic.DIT Trend Micro BackDoor.Poison.409
BKDR_Generic.DIT Trend Micro BackDoor.Singu
BKDR_Generic.DIT Trend Micro BackDoor.Poison.61
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.9167

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.