Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_HUPIGON.EVG aliases:

Name Vendor Dr.Web classification name
BKDR_HUPIGON.EVG Trend Micro Trojan.MulDrop.16145
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8629
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8630
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8534
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8576
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8691
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8574
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8750
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8515
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8575
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8521
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8679
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8639
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8510
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8668
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8665
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8499
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.879
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.5912
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8026
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.2050
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7350
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.2277
BKDR_HUPIGON.EVG Trend Micro BackDoor.Huai.2782
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7486
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.1842
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8195
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.1129
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.6927
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.6932
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.3650
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.3659
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.3750
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.6934
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7490
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7485
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7483
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8463
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.3857
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.4358
BKDR_HUPIGON.EVG Trend Micro BackDoor.BlackHole.2227
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.980
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.2777
BKDR_HUPIGON.EVG Trend Micro BackDoor.Update.55
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.5939
BKDR_HUPIGON.EVG Trend Micro BackDoor.BlackHole.2154
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.11285
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.3512
BKDR_HUPIGON.EVG Trend Micro Trojan.Spambot.3362
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.6075

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.