Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_HUPIGON.EVG aliases:

Name Vendor Dr.Web classification name
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7559
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.18881
BKDR_HUPIGON.EVG Trend Micro Trojan.MulDrop.17830
BKDR_HUPIGON.EVG Trend Micro Trojan.PWS.Banker.12840
BKDR_HUPIGON.EVG Trend Micro Trojan.PWS.LDPinch.1417
BKDR_HUPIGON.EVG Trend Micro DDoS.Bonke
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.3229
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.3227
BKDR_HUPIGON.EVG Trend Micro BackDoor.Graybird
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.2678
BKDR_HUPIGON.EVG Trend Micro BackDoor.Rpcs
BKDR_HUPIGON.EVG Trend Micro Trojan.DownLoader.24504
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.4326
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.4327
BKDR_HUPIGON.EVG Trend Micro Trojan.PWS.Lineage
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.1604
BKDR_HUPIGON.EVG Trend Micro Trojan.PWS.Qqpass.969
BKDR_HUPIGON.EVG Trend Micro Trojan.PWS.Qqpass.971
BKDR_HUPIGON.EVG Trend Micro Trojan.PWS.Maran.262
BKDR_HUPIGON.EVG Trend Micro Trojan.PWS.Gamania.2392
BKDR_HUPIGON.EVG Trend Micro BackDoor.Klj
BKDR_HUPIGON.EVG Trend Micro Trojan.Warring
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.775
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.65
BKDR_HUPIGON.EVG Trend Micro Trojan.DownLoader.4293
BKDR_HUPIGON.EVG Trend Micro DDoS.Rincux
BKDR_HUPIGON.EVG Trend Micro BackDoor.BlackHole
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.5310
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.5348
BKDR_HUPIGON.EVG Trend Micro BackDoor.Paziruk
BKDR_HUPIGON.EVG Trend Micro BackDoor.Falko.10
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.2841
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.1559
BKDR_HUPIGON.EVG Trend Micro BackDoor.Slh
BKDR_HUPIGON.EVG Trend Micro BackDoor.Zxshell
BKDR_HUPIGON.EVG Trend Micro Trojan.MulDrop.5414
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.2254
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.11826
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.2214
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.2926
BKDR_HUPIGON.EVG Trend Micro Trojan.DownLoader.29818
BKDR_HUPIGON.EVG Trend Micro Trojan.DownLoader.29780
BKDR_HUPIGON.EVG Trend Micro Trojan.DownLoader.36988
BKDR_HUPIGON.EVG Trend Micro Trojan.PWS.Gamania.5839
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.610
BKDR_HUPIGON.EVG Trend Micro Trojan.MulDrop.4647
BKDR_HUPIGON.EVG Trend Micro Trojan.DownLoader.59714
BKDR_HUPIGON.EVG Trend Micro Trojan.DownLoader.14326
BKDR_HUPIGON.EVG Trend Micro Trojan.MulDrop.5683
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.9516

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.