Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_Generic.DIT aliases:

Name Vendor Dr.Web classification name
BKDR_Generic.DIT Trend Micro Trojan.DownLoad.6527
BKDR_Generic.DIT Trend Micro Trojan.DownLoad.33809
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.12043
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.11388
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.5057
BKDR_Generic.DIT Trend Micro BackDoor.Radmin.40
BKDR_Generic.DIT Trend Micro BackDoor.Generic.1132
BKDR_Generic.DIT Trend Micro Trojan.PWS.Siggen.255
BKDR_Generic.DIT Trend Micro Trojan.DownLoader.15851
BKDR_Generic.DIT Trend Micro Trojan.MulDrop.3859
BKDR_Generic.DIT Trend Micro Trojan.MulDrop.80
BKDR_Generic.DIT Trend Micro Trojan.DownLoader.35171
BKDR_Generic.DIT Trend Micro Trojan.Packed.471
BKDR_Generic.DIT Trend Micro BackDoor.Huai.2343
BKDR_Generic.DIT Trend Micro Trojan.Inject.662
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.2290
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.23758
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.4998
BKDR_Generic.DIT Trend Micro Trojan.PWS.Wsgame.12360
BKDR_Generic.DIT Trend Micro Trojan.MulDrop.11916
BKDR_Generic.DIT Trend Micro BackDoor.IRC.16385
BKDR_Generic.DIT Trend Micro Win32.HLLW.MyBot.7
BKDR_Generic.DIT Trend Micro Trojan.KeyLogger.603
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.7179
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.13066
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.13145
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.13138
BKDR_Generic.DIT Trend Micro DDoS.Bonke
BKDR_Generic.DIT Trend Micro Trojan.DownLoad.28006
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.23191
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.12530
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.13207
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.5267
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.5261
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.4924
BKDR_Generic.DIT Trend Micro Trojan.PWS.Banker.21818
BKDR_Generic.DIT Trend Micro Trojan.PWS.Gamania.8010
BKDR_Generic.DIT Trend Micro Trojan.MulDrop.19262
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.14103
BKDR_Generic.DIT Trend Micro BackDoor.Haxdoor.440
BKDR_Generic.DIT Trend Micro Trojan.PWS.Webmonier.14
BKDR_Generic.DIT Trend Micro BackDoor.Dosia.151
BKDR_Generic.DIT Trend Micro Trojan.MulDrop.14610
BKDR_Generic.DIT Trend Micro Trojan.PWS.Wsgame.12662
BKDR_Generic.DIT Trend Micro Trojan.NtRootKit.2889
BKDR_Generic.DIT Trend Micro BackDoor.Dosia.154
BKDR_Generic.DIT Trend Micro BackDoor.Dosia.150
BKDR_Generic.DIT Trend Micro BackDoor.Phime.53
BKDR_Generic.DIT Trend Micro BackDoor.Dosia.148
BKDR_Generic.DIT Trend Micro Program.ServUServer

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.