Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_TDSS.SMP aliases:

Name Vendor Dr.Web classification name
BKDR_TDSS.SMP Trend Micro BackDoor.Tdss.342
BKDR_TDSS.SMP Trend Micro BackDoor.Tdss.266
BKDR_TDSS.SMP Trend Micro BackDoor.Tdss.214
BKDR_TDSS.SMP Trend Micro Trojan.Packed.2479
BKDR_TDSS.SMP Trend Micro Trojan.Packed.637
BKDR_TDSS.SMP Trend Micro BackDoor.Tdss.based.1
BKDR_TDSS.SMP Trend Micro BackDoor.Tdss.407
BKDR_TDSS.SMP Trend Micro BackDoor.Tdss.262
BKDR_TDSS.SMP Trend Micro BackDoor.Tdss.403
BKDR_TDSS.SMP Trend Micro Trojan.Packed.444
BKDR_TDSS.SMP Trend Micro BackDoor.Tdss.248
BKDR_TDSS.SMP Trend Micro Trojan.NtRootKit.2997
BKDR_TDSS.SMP Trend Micro BackDoor.Tdss.228
BKDR_TDSS.SMP Trend Micro BackDoor.Tdss.280
BKDR_TDSS.SMP Trend Micro BackDoor.Geyekr.2
BKDR_TDSS.SMP Trend Micro BackDoor.Geyekr
BKDR_TDSS.SMP Trend Micro BackDoor.Tdss.321
BKDR_TDSS.SMP Trend Micro BackDoor.Tdss.293
BKDR_TDSS.SMP Trend Micro BackDoor.Tdss.363
BKDR_TDSS.SMP Trend Micro Trojan.Packed.520
BKDR_TDSS.SMP Trend Micro BackDoor.Geyekr.5
BKDR_TDSS.SMP Trend Micro BackDoor.Geyekr.4
BKDR_TDSS.SMP Trend Micro BackDoor.Tdss.268
BKDR_TDSS.SMP Trend Micro Trojan.Packed.2788
BKDR_TDSS.SMP Trend Micro BackDoor.Tdss.498
BKDR_TDSS.SMP Trend Micro BackDoor.Tdss.223
BKDR_TDSS.SMP Trend Micro BackDoor.Tdss.425
BKDR_TDSS.SMP Trend Micro Trojan.NtRootKit.3036
BKDR_TDSS.SMP Trend Micro BackDoor.Tdss.297
BKDR_TDSS.SMP Trend Micro BackDoor.Tdss.260
BKDR_TDSS.SMP Trend Micro BackDoor.Tdss.233
BKDR_TDSS.SMP Trend Micro BackDoor.Tdss.419
BKDR_TDSS.SMP Trend Micro BackDoor.Tdss.538
BKDR_TDSS.SMP Trend Micro BackDoor.Tdss.226
BKDR_TDSS.SMP Trend Micro Trojan.DownLoad.38461
BKDR_TDSS.SMP Trend Micro BackDoor.Tdss.372
BKDR_TDSS.SMP Trend Micro Trojan.Siggen.5068
BKDR_TDSS.SMP Trend Micro Trojan.Siggen.5063
BKDR_TDSS.SMP Trend Micro BackDoor.Tdss.270
BKDR_TDSS.SMP Trend Micro BackDoor.Tdss.369
BKDR_TDSS.SMP Trend Micro BackDoor.Tdss.269
BKDR_TDSS.SMP Trend Micro BackDoor.Tdss.435
BKDR_TDSS.SMP Trend Micro BackDoor.Tdss.304
BKDR_TDSS.SMP Trend Micro BackDoor.Tdss.310

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.