Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_Generic.DIT aliases:

Name Vendor Dr.Web classification name
BKDR_Generic.DIT Trend Micro Win32.HLLW.MyBot.556
BKDR_Generic.DIT Trend Micro BackDoor.BlackHole.2192
BKDR_Generic.DIT Trend Micro BackDoor.IRC.Sdbot.5380
BKDR_Generic.DIT Trend Micro Trojan.MulDrop.36244
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.25557
BKDR_Generic.DIT Trend Micro Win32.HLLW.MyBot.6429
BKDR_Generic.DIT Trend Micro BackDoor.Siggen.1104
BKDR_Generic.DIT Trend Micro BackDoor.IRC.Sdbot.5360
BKDR_Generic.DIT Trend Micro BackDoor.Siggen.5071
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.29961
BKDR_Generic.DIT Trend Micro Tool.MessenPass.8
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.27575
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.20803
BKDR_Generic.DIT Trend Micro Win32.HLLW.Autoruner.9130
BKDR_Generic.DIT Trend Micro Win32.HLLW.MyBot.674
BKDR_Generic.DIT Trend Micro Trojan.Proxy.993
BKDR_Generic.DIT Trend Micro BackDoor.IRC.Sdbot.6782
BKDR_Generic.DIT Trend Micro BackDoor.Bifrost.1834
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.27471
BKDR_Generic.DIT Trend Micro Trojan.Packed.681
BKDR_Generic.DIT Trend Micro Trojan.DownLoad.29915
BKDR_Generic.DIT Trend Micro BackDoor.Siggen.997
BKDR_Generic.DIT Trend Micro Win32.HLLW.MyBot.271
BKDR_Generic.DIT Trend Micro Trojan.DownLoad1.14621
BKDR_Generic.DIT Trend Micro BackDoor.IRC.Sdbot.5388
BKDR_Generic.DIT Trend Micro Win32.HLLW.Autoruner.17305
BKDR_Generic.DIT Trend Micro BackDoor.Cia.93
BKDR_Generic.DIT Trend Micro BackDoor.Darkshell.129
BKDR_Generic.DIT Trend Micro BackDoor.Bifrost.895
BKDR_Generic.DIT Trend Micro BackDoor.Siggen.1018
BKDR_Generic.DIT Trend Micro BackDoor.Tiny.56
BKDR_Generic.DIT Trend Micro BackDoor.Bifrost.1566
BKDR_Generic.DIT Trend Micro Trojan.Siggen1.8389
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.58306
BKDR_Generic.DIT Trend Micro BackDoor.Spy.117
BKDR_Generic.DIT Trend Micro BackDoor.PcClient.1530
BKDR_Generic.DIT Trend Micro BackDoor.IRC.Sdbot.5377
BKDR_Generic.DIT Trend Micro BackDoor.Poison.1195
BKDR_Generic.DIT Trend Micro Win32.HLLW.MyBot.548
BKDR_Generic.DIT Trend Micro BackDoor.Bifrost.1577
BKDR_Generic.DIT Trend Micro BackDoor.Siggen.3008
BKDR_Generic.DIT Trend Micro BackDoor.Shark.172
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.25427
BKDR_Generic.DIT Trend Micro Trojan.Folsnif.108
BKDR_Generic.DIT Trend Micro BackDoor.Bifrost.828
BKDR_Generic.DIT Trend Micro Win32.HLLW.MyBot.558
BKDR_Generic.DIT Trend Micro BackDoor.Bifrost.1526
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.27685
BKDR_Generic.DIT Trend Micro BackDoor.BlackHole.3683
BKDR_Generic.DIT Trend Micro BackDoor.Poison.1906

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.