Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_HUPIGON.EVG aliases:

Name Vendor Dr.Web classification name
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.1249
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.2170
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8282
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7033
BKDR_HUPIGON.EVG Trend Micro Trojan.Freed
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8989
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.3154
BKDR_HUPIGON.EVG Trend Micro Trojan.DownLoad.40138
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.6335
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.6881
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.11706
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8018
BKDR_HUPIGON.EVG Trend Micro Trojan.DownLoader.24002
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7872
BKDR_HUPIGON.EVG Trend Micro BackDoor.Huai.1526
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.6822
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.3607
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.4980
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.4347
BKDR_HUPIGON.EVG Trend Micro Trojan.MulDrop1.304
BKDR_HUPIGON.EVG Trend Micro BackDoor.Huai.1748
BKDR_HUPIGON.EVG Trend Micro Trojan.PWS.Qqrobber.133
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8704
BKDR_HUPIGON.EVG Trend Micro Trojan.Popwin.origin
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8362
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.11871
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8753
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8295
BKDR_HUPIGON.EVG Trend Micro BackDoor.Update.27
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.23684
BKDR_HUPIGON.EVG Trend Micro Trojan.KeyLogger.719
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.19150
BKDR_HUPIGON.EVG Trend Micro BackDoor.Seed.11
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7287
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.6237
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.1535
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7162
BKDR_HUPIGON.EVG Trend Micro Trojan.PWS.Wsgame
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7405
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.4677
BKDR_HUPIGON.EVG Trend Micro BackDoor.BackBook
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8472
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.1547
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8326
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.1925
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.4958
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.199
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.9515
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.2613
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.1277

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.