Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_Generic.DIT aliases:

Name Vendor Dr.Web classification name
BKDR_Generic.DIT Trend Micro BackDoor.Mosu.22
BKDR_Generic.DIT Trend Micro BackDoor.Beizhu.471
BKDR_Generic.DIT Trend Micro Trojan.MulDrop.35355
BKDR_Generic.DIT Trend Micro Trojan.DownLoader.59189
BKDR_Generic.DIT Trend Micro BackDoor.Huai.1905
BKDR_Generic.DIT Trend Micro BackDoor.Redgirl
BKDR_Generic.DIT Trend Micro BackDoor.IRC.Sdbot.909
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.2709
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.5419
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.6728
BKDR_Generic.DIT Trend Micro BackDoor.Dumb
BKDR_Generic.DIT Trend Micro Win32.HLLW.Autoruner.6441
BKDR_Generic.DIT Trend Micro BackDoor.Rozmowa
BKDR_Generic.DIT Trend Micro Trojan.Packed.19647
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.9351
BKDR_Generic.DIT Trend Micro BackDoor.Poison.772
BKDR_Generic.DIT Trend Micro BackDoor.Poison.778
BKDR_Generic.DIT Trend Micro Trojan.DownLoad.1178
BKDR_Generic.DIT Trend Micro BackDoor.Roxrat.13
BKDR_Generic.DIT Trend Micro Trojan.MulDrop.9263
BKDR_Generic.DIT Trend Micro Trojan.DownLoader.63486
BKDR_Generic.DIT Trend Micro Trojan.MulDrop.31923
BKDR_Generic.DIT Trend Micro BackDoor.DSS
BKDR_Generic.DIT Trend Micro BackDoor.Bifrost.1006
BKDR_Generic.DIT Trend Micro BackDoor.Bifrost.472
BKDR_Generic.DIT Trend Micro BackDoor.Beizhu.1029
BKDR_Generic.DIT Trend Micro BackDoor.Sabason.51
BKDR_Generic.DIT Trend Micro Trojan.MulDrop.33902
BKDR_Generic.DIT Trend Micro Trojan.Proxy.2755
BKDR_Generic.DIT Trend Micro Trojan.DownLoad.50228
BKDR_Generic.DIT Trend Micro Trojan.MulDrop.16316
BKDR_Generic.DIT Trend Micro Trojan.MulDrop.35922
BKDR_Generic.DIT Trend Micro BackDoor.Poison.1128
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.9585
BKDR_Generic.DIT Trend Micro BackDoor.Siggen.955
BKDR_Generic.DIT Trend Micro Trojan.PWS.Maran.438
BKDR_Generic.DIT Trend Micro Trojan.Click.18599
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.9678
BKDR_Generic.DIT Trend Micro BackDoor.Beizhu.2367
BKDR_Generic.DIT Trend Micro BackDoor.Sakl.331
BKDR_Generic.DIT Trend Micro BackDoor.Darkshell.11
BKDR_Generic.DIT Trend Micro BackDoor.Sakl.103
BKDR_Generic.DIT Trend Micro Trojan.MulDrop.6929
BKDR_Generic.DIT Trend Micro Trojan.MulDrop.30701
BKDR_Generic.DIT Trend Micro Trojan.Packed.47
BKDR_Generic.DIT Trend Micro BackDoor.IRC.Sdbot.4900
BKDR_Generic.DIT Trend Micro BackDoor.PSClient.121
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.3683
BKDR_Generic.DIT Trend Micro BackDoor.IRC.SiN
BKDR_Generic.DIT Trend Micro BackDoor.Poison.165

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.