Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_Generic.DIT aliases:

Name Vendor Dr.Web classification name
BKDR_Generic.DIT Trend Micro Win32.HLLW.MyBot.48
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.32229
BKDR_Generic.DIT Trend Micro BackDoor.IRC.Sdbot.5494
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.27398
BKDR_Generic.DIT Trend Micro BackDoor.Bifrost.1057
BKDR_Generic.DIT Trend Micro BackDoor.Klukz.33
BKDR_Generic.DIT Trend Micro BackDoor.Poison.1378
BKDR_Generic.DIT Trend Micro BackDoor.IRC.Sdbot.5507
BKDR_Generic.DIT Trend Micro BackDoor.Poison.1318
BKDR_Generic.DIT Trend Micro Win32.HLLW.MyBot.143
BKDR_Generic.DIT Trend Micro BackDoor.Siggen.5037
BKDR_Generic.DIT Trend Micro BackDoor.PcClient.1073
BKDR_Generic.DIT Trend Micro Trojan.DownLoader1.36858
BKDR_Generic.DIT Trend Micro BackDoor.Xbot.117
BKDR_Generic.DIT Trend Micro BackDoor.Bifrost.3039
BKDR_Generic.DIT Trend Micro Trojan.Siggen.12641
BKDR_Generic.DIT Trend Micro BackDoor.Bifrost.1046
BKDR_Generic.DIT Trend Micro BackDoor.Xboot.45
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.25928
BKDR_Generic.DIT Trend Micro Trojan.Siggen.27889
BKDR_Generic.DIT Trend Micro Win32.HLLW.MyBot.124
BKDR_Generic.DIT Trend Micro BackDoor.PcClient.2835
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.27610
BKDR_Generic.DIT Trend Micro BackDoor.PcClient.4581
BKDR_Generic.DIT Trend Micro BackDoor.ProRat.528
BKDR_Generic.DIT Trend Micro BackDoor.Shark.251
BKDR_Generic.DIT Trend Micro BackDoor.Bifrost.1050
BKDR_Generic.DIT Trend Micro Win32.HLLW.Autoruner.10691
BKDR_Generic.DIT Trend Micro Win32.HLLW.MyBot.127
BKDR_Generic.DIT Trend Micro Trojan.Siggen.12629
BKDR_Generic.DIT Trend Micro BackDoor.Poison.2385
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.33240
BKDR_Generic.DIT Trend Micro Win32.HLLW.Autoruner.8005
BKDR_Generic.DIT Trend Micro BackDoor.PcClient.1492
BKDR_Generic.DIT Trend Micro BackDoor.IRC.Sdbot.5419
BKDR_Generic.DIT Trend Micro Win32.HLLW.MyBot.133
BKDR_Generic.DIT Trend Micro BackDoor.BlackHole.3695
BKDR_Generic.DIT Trend Micro Trojan.Siggen2.16899
BKDR_Generic.DIT Trend Micro BackDoor.ProRat.526
BKDR_Generic.DIT Trend Micro BackDoor.Shark.183
BKDR_Generic.DIT Trend Micro BackDoor.PcClient.1418
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.28077
BKDR_Generic.DIT Trend Micro Win32.HLLW.Autoruner.17555
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.25856
BKDR_Generic.DIT Trend Micro BackDoor.IRC.Sdbot.6480
BKDR_Generic.DIT Trend Micro BackDoor.BlackHole.3696
BKDR_Generic.DIT Trend Micro Win32.HLLW.Autoruner.17811
BKDR_Generic.DIT Trend Micro BackDoor.Poison.1304
BKDR_Generic.DIT Trend Micro BackDoor.Siggen.2509
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.25794

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.