Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BScope.Backdoor.Sdbot.pa aliases:

Name Vendor Dr.Web classification name
BScope.Backdoor.Sdbot.pa VirusBlokAda BackDoor.IRC.Sdbot.503
BScope.Backdoor.Sdbot.pa VirusBlokAda BackDoor.IRC.Sdbot.520
BScope.Backdoor.Sdbot.pa VirusBlokAda BackDoor.IRC.Sdbot.358
BScope.Backdoor.Sdbot.pa VirusBlokAda BackDoor.IRC.Sdbot.334
BScope.Backdoor.Sdbot.pa VirusBlokAda BackDoor.IRC.Sdbot.4827
BScope.Backdoor.Sdbot.pa VirusBlokAda BackDoor.IRC.Sdbot.1622
BScope.Backdoor.Sdbot.pa VirusBlokAda BackDoor.IRC.Sdbot.1072
BScope.Backdoor.Sdbot.pa VirusBlokAda BackDoor.IRC.Sdbot.1795
BScope.Backdoor.Sdbot.pa VirusBlokAda BackDoor.Oscar
BScope.Backdoor.Sdbot.pa VirusBlokAda BackDoor.IRC.Sdbot.1478
BScope.Backdoor.Sdbot.pa VirusBlokAda BackDoor.IRC.Sdbot.1474
BScope.Backdoor.Sdbot.pa VirusBlokAda BackDoor.IRC.Sdbot.1417
BScope.Backdoor.Sdbot.pa VirusBlokAda BackDoor.IRC.Sdbot.401
BScope.Backdoor.Sdbot.pa VirusBlokAda BackDoor.IRC.Sdbot.344
BScope.Backdoor.Sdbot.pa VirusBlokAda BackDoor.IRC.Sdbot.402
BScope.Backdoor.Sdbot.pa VirusBlokAda BackDoor.IRC.Sdbot.403
BScope.Backdoor.Sdbot.pa VirusBlokAda BackDoor.IRC.Sdbot.537
BScope.Backdoor.Sdbot.pa VirusBlokAda BackDoor.IRC.Sdbot.833
BScope.Backdoor.Sdbot.pa VirusBlokAda BackDoor.IRC.Sdbot.308
BScope.Backdoor.Sdbot.pa VirusBlokAda BackDoor.IRC.Sdbot.533
BScope.Backdoor.Sdbot.pa VirusBlokAda BackDoor.IRC.Sdbot.922
BScope.Backdoor.Sdbot.pa VirusBlokAda BackDoor.IRC.Sdbot.437
BScope.Backdoor.Sdbot.pa VirusBlokAda Win32.HLLW.MyBot.212
BScope.Backdoor.Sdbot.pa VirusBlokAda BackDoor.IRC.Sdbot.613
BScope.Backdoor.Sdbot.pa VirusBlokAda Win32.HLLW.MyBot
BScope.Backdoor.Sdbot.pa VirusBlokAda BackDoor.IRC.Sdbot.508
BScope.Backdoor.Sdbot.pa VirusBlokAda Win32.HLLW.MyBot.5294
BScope.Backdoor.Sdbot.pa VirusBlokAda Win32.HLLW.MyBot.5306
BScope.Backdoor.Sdbot.pa VirusBlokAda Win32.HLLW.MyBot.5324
BScope.Backdoor.Sdbot.pa VirusBlokAda Win32.HLLW.MyBot.5519
BScope.Backdoor.Sdbot.pa VirusBlokAda BackDoor.IRC.Sdbot.815
BScope.Backdoor.Sdbot.pa VirusBlokAda Win32.HLLW.MyBot.5805
BScope.Backdoor.Sdbot.pa VirusBlokAda BackDoor.IRC.Sdbot.154
BScope.Backdoor.Sdbot.pa VirusBlokAda BackDoor.IRC.Sdbot.162
BScope.Backdoor.Sdbot.pa VirusBlokAda BackDoor.IRC.Sdbot.429
BScope.Backdoor.Sdbot.pa VirusBlokAda BackDoor.IRC.Sdbot.530
BScope.Backdoor.Sdbot.pa VirusBlokAda BackDoor.IRC.Sdbot.628
BScope.Backdoor.Sdbot.pa VirusBlokAda BackDoor.IRC.Sdbot.1418
BScope.Backdoor.Sdbot.pa VirusBlokAda BackDoor.IRC.Sdbot.based
BScope.Backdoor.Sdbot.pa VirusBlokAda Win32.HLLW.MyBot.3763
BScope.Backdoor.Sdbot.pa VirusBlokAda Win32.HLLW.MyBot.3715
BScope.Backdoor.Sdbot.pa VirusBlokAda Win32.HLLW.MyBot.4101
BScope.Backdoor.Sdbot.pa VirusBlokAda Win32.HLLW.MyBot.4652
BScope.Backdoor.Sdbot.pa VirusBlokAda BackDoor.IRC.Sdbot.523
BScope.Backdoor.Sdbot.pa VirusBlokAda BackDoor.IRC.Sdbot.341
BScope.Backdoor.Sdbot.pa VirusBlokAda BackDoor.IRC.Sdbot.55
BScope.Backdoor.Sdbot.pa VirusBlokAda Win32.HLLW.MyBot.4179
BScope.Backdoor.Sdbot.pa VirusBlokAda Win32.HLLW.MyBot.4771
BScope.Backdoor.Sdbot.pa VirusBlokAda Win32.HLLW.MyBot.3800
BScope.Backdoor.Sdbot.pa VirusBlokAda Win32.HLLW.MyBot.4219

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.