Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_Generic.DIT aliases:

Name Vendor Dr.Web classification name
BKDR_Generic.DIT Trend Micro BackDoor.Way.29
BKDR_Generic.DIT Trend Micro BackDoor.Bifrost.7855
BKDR_Generic.DIT Trend Micro BackDoor.Siggen.1281
BKDR_Generic.DIT Trend Micro Trojan.PWS.Bancos.538
BKDR_Generic.DIT Trend Micro BackDoor.Cia.219
BKDR_Generic.DIT Trend Micro Win32.HLLW.MyBot.80
BKDR_Generic.DIT Trend Micro BackDoor.Poison.2374
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.25667
BKDR_Generic.DIT Trend Micro Trojan.Siggen.12672
BKDR_Generic.DIT Trend Micro BackDoor.Shark.1208
BKDR_Generic.DIT Trend Micro BackDoor.DarkMoon.183
BKDR_Generic.DIT Trend Micro Trojan.Siggen.12064
BKDR_Generic.DIT Trend Micro BackDoor.Bifrost.1040
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.25809
BKDR_Generic.DIT Trend Micro Trojan.Click.30545
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.25898
BKDR_Generic.DIT Trend Micro BackDoor.DarkMoon.173
BKDR_Generic.DIT Trend Micro BackDoor.IRC.Sdbot.6317
BKDR_Generic.DIT Trend Micro BackDoor.Bifrost.3135
BKDR_Generic.DIT Trend Micro BackDoor.Siggen.2614
BKDR_Generic.DIT Trend Micro Adware.Baidu.1234
BKDR_Generic.DIT Trend Micro BackDoor.IRC.Sdbot.6096
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.32229
BKDR_Generic.DIT Trend Micro Win32.HLLW.MyBot.6580
BKDR_Generic.DIT Trend Micro BackDoor.Bifrost.2875
BKDR_Generic.DIT Trend Micro BackDoor.PcClient.1073
BKDR_Generic.DIT Trend Micro BackDoor.Bifrost.3039
BKDR_Generic.DIT Trend Micro BackDoor.Bifrost.1069
BKDR_Generic.DIT Trend Micro BackDoor.IRC.Sdbot.5827
BKDR_Generic.DIT Trend Micro BackDoor.PcClient.4581
BKDR_Generic.DIT Trend Micro BackDoor.Bifrost.1050
BKDR_Generic.DIT Trend Micro Trojan.Siggen.12629
BKDR_Generic.DIT Trend Micro BackDoor.Poison.1331
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.27726
BKDR_Generic.DIT Trend Micro Win32.HLLW.MyBot.587
BKDR_Generic.DIT Trend Micro BackDoor.PcClient.1418
BKDR_Generic.DIT Trend Micro Win32.HLLW.Autoruner.17555
BKDR_Generic.DIT Trend Micro BackDoor.IRC.Sdbot.6480
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.25832
BKDR_Generic.DIT Trend Micro BackDoor.Siggen.2509
BKDR_Generic.DIT Trend Micro Trojan.Click.30782
BKDR_Generic.DIT Trend Micro BackDoor.Poison.2102
BKDR_Generic.DIT Trend Micro BackDoor.Siggen.1233
BKDR_Generic.DIT Trend Micro BackDoor.Siggen.14933
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.29169
BKDR_Generic.DIT Trend Micro BackDoor.Pigeon.28712
BKDR_Generic.DIT Trend Micro Win32.HLLW.MyBot.46
BKDR_Generic.DIT Trend Micro Win32.HLLW.Autoruner.8651
BKDR_Generic.DIT Trend Micro BackDoor.IRC.Sdbot.5529
BKDR_Generic.DIT Trend Micro BackDoor.Bifrost.1121

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.