Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_HUPIGON.EVG aliases:

Name Vendor Dr.Web classification name
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7202
BKDR_HUPIGON.EVG Trend Micro BackDoor.Huai.1053
BKDR_HUPIGON.EVG Trend Micro BackDoor.Beizhu.365
BKDR_HUPIGON.EVG Trend Micro BackDoor.Huai.923
BKDR_HUPIGON.EVG Trend Micro BackDoor.Huai.915
BKDR_HUPIGON.EVG Trend Micro BackDoor.Huai.924
BKDR_HUPIGON.EVG Trend Micro BackDoor.Huai.875
BKDR_HUPIGON.EVG Trend Micro BackDoor.Huai.888
BKDR_HUPIGON.EVG Trend Micro BackDoor.Huai.914
BKDR_HUPIGON.EVG Trend Micro BackDoor.Huai.919
BKDR_HUPIGON.EVG Trend Micro BackDoor.Huai.882
BKDR_HUPIGON.EVG Trend Micro BackDoor.Huai.1043
BKDR_HUPIGON.EVG Trend Micro BackDoor.BlackHole.2121
BKDR_HUPIGON.EVG Trend Micro BackDoor.Huai.903
BKDR_HUPIGON.EVG Trend Micro BackDoor.Huai.921
BKDR_HUPIGON.EVG Trend Micro BackDoor.Huai.916
BKDR_HUPIGON.EVG Trend Micro Trojan.Popwin.665
BKDR_HUPIGON.EVG Trend Micro Trojan.Popwin.667
BKDR_HUPIGON.EVG Trend Micro Trojan.PWS.Maran.296
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.12847
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.3665
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.6662
BKDR_HUPIGON.EVG Trend Micro BackDoor.Ipyx
BKDR_HUPIGON.EVG Trend Micro Trojan.PWS.Capi
BKDR_HUPIGON.EVG Trend Micro Trojan.PWS.Ran.2
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.2122
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.2900
BKDR_HUPIGON.EVG Trend Micro Trojan.MulDrop.6412
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.5482
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8651
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.2642
BKDR_HUPIGON.EVG Trend Micro BackDoor.Beizhu.941
BKDR_HUPIGON.EVG Trend Micro Trojan.PWS.Maran.260
BKDR_HUPIGON.EVG Trend Micro Trojan.DownLoader.62563
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7355
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.3927
BKDR_HUPIGON.EVG Trend Micro BackDoor.IRC.Sdbot.3192
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.11716
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8746
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8531
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8642
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8529
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8550
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8669
BKDR_HUPIGON.EVG Trend Micro Trojan.DownLoader.49866
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.9466
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8657
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8525
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8680
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.10879

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.