FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BackDoor-CEP aliases:

Name Vendor Dr.Web classification name
BackDoor-CEP McAfee BackDoor.Pigeon
BackDoor-CEP McAfee Trojan.MulDrop.3177
BackDoor-CEP McAfee Trojan.MulDrop.2583
BackDoor-CEP McAfee BackDoor.Bifrost.26
BackDoor-CEP McAfee BackDoor.DMoon.52
Backdoor-CEP McAfee Trojan.MulDrop.11171
BackDoor-CEP McAfee Trojan.MulDrop.2587
BackDoor-CEP McAfee Trojan.MulDrop.30310
BackDoor-CEP McAfee Trojan.MulDrop.2883
BackDoor-CEP McAfee Trojan.MulDrop.247
BackDoor-CEP McAfee Trojan.MulDrop.3011
BackDoor-CEP McAfee BackDoor.Ralf
BackDoor-CEP McAfee Trojan.Lazarus
BackDoor-CEP McAfee BackDoor.Bifrost.37
BackDoor-CEP McAfee Trojan.MulDrop.1861
BackDoor-CEP McAfee BackDoor.Bifrost
BackDoor-CEP McAfee BackDoor.Bifrost.11
BackDoor-CEP McAfee BackDoor.Bifrost.35
BackDoor-CEP McAfee BackDoor.Bifrost.10
BackDoor-CEP McAfee Trojan.MulDrop.3588
BackDoor-CEP McAfee BackDoor.Pigeon.36
BackDoor-CEP McAfee Trojan.MulDrop.3111
BackDoor-CEP McAfee Trojan.NtRootKit.40
BackDoor-CEP McAfee Trojan.MulDrop.3229
BackDoor-CEP McAfee BackDoor.Bifrost.24
BackDoor-CEP McAfee BackDoor.Bifrost.44
BackDoor-CEP McAfee Trojan.MulDrop.3802
BackDoor-CEP McAfee BackDoor.Bifrost.56
BackDoor-CEP McAfee BackDoor.Bifrost.63
BackDoor-CEP McAfee BackDoor.Bifrost.65
BackDoor-CEP McAfee BackDoor.Bifrost.73
BackDoor-CEP McAfee BackDoor.Pigeon.38
BackDoor-CEP McAfee BackDoor.Graybird
Backdoor-CEP McAfee BackDoor.Bifrost.65
BackDoor-CEP McAfee Win32.HLLW.MyBot
BackDoor-CEP McAfee Trojan.MulDrop.4658
BackDoor-CEP McAfee Trojan.MulDrop.12378
BackDoor-CEP McAfee Trojan.MulDrop.7435
BackDoor-CEP McAfee Trojan.MulDrop.11473
BackDoor-CEP McAfee BackDoor.SevenEleven
BackDoor-CEP McAfee BackDoor.Pigeon.5111
BackDoor-CEP McAfee Trojan.DownLoader.15463
BackDoor-CEP McAfee Trojan.DownLoader.17528
BackDoor-CEP McAfee Trojan.Click.2062
BackDoor-CEP McAfee Trojan.DownLoad.186
BackDoor-CEP McAfee Trojan.PWS.LDPinch.1911
BackDoor-CEP McAfee BackDoor.Bifrost.780
BackDoor-CEP McAfee Trojan.DownLoader.14399
BackDoor-CEP McAfee Adware.Letscool
BackDoor-CEP McAfee BackDoor.Bifrost.106

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies