Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_Generic.DIT aliases:

Name Vendor Dr.Web classification name
BKDR_Generic.DIT Trend Micro BackDoor.Poison.767
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.10401
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.9410
BKDR_Generic.DIT Trend Micro BackDoor.Siggen.657
BKDR_Generic.DIT Trend Micro Trojan.MulDrop.31446
BKDR_Generic.DIT Trend Micro Trojan.PWS.Panda.7
BKDR_Generic.DIT Trend Micro Trojan.Packed.490
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.14208
BKDR_Generic.DIT Trend Micro BackDoor.Inge
BKDR_Generic.DIT Trend Micro BackDoor.Netgx.11
BKDR_Generic.DIT Trend Micro Trojan.DownLoader.43047
BKDR_Generic.DIT Trend Micro BackDoor.BlackHole.2177
BKDR_Generic.DIT Trend Micro Trojan.MulDrop.7416
BKDR_Generic.DIT Trend Micro Trojan.Fakealert.1310
BKDR_Generic.DIT Trend Micro Win32.Induc
BKDR_Generic.DIT Trend Micro Trojan.Inject.778
BKDR_Generic.DIT Trend Micro Trojan.MulDrop.7420
BKDR_Generic.DIT Trend Micro Trojan.MulDrop.12034
BKDR_Generic.DIT Trend Micro Trojan.MulDrop.8497
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.2254
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.2486
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.5062
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.21838
BKDR_Generic.DIT Trend Micro BackDoor.IRC.Sdbot.3654
BKDR_Generic.DIT Trend Micro BackDoor.Radoor
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.6811
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.2348
BKDR_Generic.DIT Trend Micro BackDoor.Huai.2022
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.8279
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.1910
BKDR_Generic.DIT Trend Micro BackDoor.Zaliv.142
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.11871
BKDR_Generic.DIT Trend Micro BackDoor.Bulknet.217
BKDR_Generic.DIT Trend Micro BackDoor.Agobot.24
BKDR_Generic.DIT Trend Micro BackDoor.Darkshell.21
BKDR_Generic.DIT Trend Micro Trojan.MulDrop.7451
BKDR_Generic.DIT Trend Micro BackDoor.Bifrost.491
BKDR_Generic.DIT Trend Micro Tool.Gina.1
BKDR_Generic.DIT Trend Micro BackDoor.Assec.11
BKDR_Generic.DIT Trend Micro BackDoor.Aphex.10
BKDR_Generic.DIT Trend Micro BackDoor.Bifrost.637
BKDR_Generic.DIT Trend Micro BackDoor.Sakl
BKDR_Generic.DIT Trend Micro Win32.HLLW.Autoruner.2597
BKDR_Generic.DIT Trend Micro Trojan.DownLoad.28245
BKDR_Generic.DIT Trend Micro BackDoor.IRC.Sdbot.4282
BKDR_Generic.DIT Trend Micro BackDoor.IRC.Chazz.106
BKDR_Generic.DIT Trend Micro BackDoor.Dtr.15
BKDR_Generic.DIT Trend Micro Tool.DialupPass
BKDR_Generic.DIT Trend Micro BackDoor.Klj
BKDR_Generic.DIT Trend Micro BackDoor.Huai.2967

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.