Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_HUPIGON.EVG aliases:

Name Vendor Dr.Web classification name
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.2723
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.10962
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.13055
BKDR_HUPIGON.EVG Trend Micro Trojan.MulDrop.7184
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.525
BKDR_HUPIGON.EVG Trend Micro Trojan.DownLoad.14911
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.6176
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.3384
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.2185
BKDR_HUPIGON.EVG Trend Micro Trojan.DownLoad1.43440
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8267
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8795
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.444
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.17263
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8022
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.2598
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.17491
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.1188
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.5286
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.2769
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.543
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.2995
BKDR_HUPIGON.EVG Trend Micro Trojan.Siggen.4152
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.12428
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8418
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.2298
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8788
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.22135
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8608
BKDR_HUPIGON.EVG Trend Micro Trojan.MulDrop.30358
BKDR_HUPIGON.EVG Trend Micro Trojan.PWS.Maran
BKDR_HUPIGON.EVG Trend Micro Trojan.PWS.Lineage.3734
BKDR_HUPIGON.EVG Trend Micro Trojan.PWS.Gamania
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.2281
BKDR_HUPIGON.EVG Trend Micro Trojan.DownLoader.24865
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.3573
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.3945
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.4371
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.4379
BKDR_HUPIGON.EVG Trend Micro Trojan.PWS.Qqpass.1456
BKDR_HUPIGON.EVG Trend Micro BackDoor.Beizhu.1086
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7046
BKDR_HUPIGON.EVG Trend Micro BackDoor.Huai.577
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.9774
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.3241
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.9848
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.1743
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8683
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7368
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.1275

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.