Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BackDoor-CEP!hv.a aliases:

Name Vendor Dr.Web classification name
BackDoor-CEP!hv.a McAfee BackDoor.Bifrost.515
BackDoor-CEP!hv.a McAfee BackDoor.Bifrost.66
BackDoor-CEP!hv.a McAfee BackDoor.Bifrost.906
BackDoor-CEP!hv.a McAfee BackDoor.Bifrost.1029
BackDoor-CEP!hv.a McAfee BackDoor.Bifrost.8
BackDoor-CEP!hv.a McAfee BackDoor.Bifrost.779
BackDoor-CEP!hv.a McAfee Trojan.Packed.650
BackDoor-CEP!hv.a McAfee Trojan.Inject.5089
BackDoor-CEP!hv.a McAfee BackDoor.Bifrost.756
BackDoor-CEP!hv.a McAfee BackDoor.Bifrost.1018
BackDoor-CEP!hv.a McAfee BackDoor.Bifrost.833
BackDoor-CEP!hv.a McAfee Trojan.Inject.3631
BackDoor-CEP!hv.a McAfee BackDoor.Bifrost
BackDoor-CEP!hv.a McAfee Trojan.Packed.140
BackDoor-CEP!hv.a McAfee Trojan.Inject.3866
BackDoor-CEP!hv.a McAfee Trojan.Siggen.3672
BackDoor-CEP!hv.a McAfee Trojan.Packed.469
BackDoor-CEP!hv.a McAfee BackDoor.Bifrost.220
BackDoor-CEP!hv.a McAfee Trojan.Packed.494
BackDoor-CEP!hv.a McAfee Trojan.Inject.5098
BackDoor-CEP!hv.a McAfee BackDoor.Bifrost.812
BackDoor-CEP!hv.a McAfee Win32.HLLW.Autoruner.16337
BackDoor-CEP!hv.a McAfee Trojan.Packed.418
BackDoor-CEP!hv.a McAfee BackDoor.Bifrost.944
BackDoor-CEP!hv.a McAfee Trojan.Packed.143
BackDoor-CEP!hv.a McAfee Trojan.Inject.5077
BackDoor-CEP!hv.a McAfee BackDoor.Bifrost.767
BackDoor-CEP!hv.a McAfee Win32.HLLW.Autoruner.14515
BackDoor-CEP!hv.a McAfee Win32.HLLW.Autoruner.15162
BackDoor-CEP!hv.a McAfee Win32.HLLW.Autoruner.14759
BackDoor-CEP!hv.a McAfee BackDoor.Bifrost.831
BackDoor-CEP!hv.a McAfee BackDoor.Bifrost.699
BackDoor-CEP!hv.a McAfee Trojan.MulDrop.9319
BackDoor-CEP!hv.a McAfee Win32.HLLW.Autoruner.14708
BackDoor-CEP!hv.a McAfee Win32.HLLW.Autoruner.15013
BackDoor-CEP!hv.a McAfee Win32.HLLW.Autoruner.15450
BackDoor-CEP!hv.a McAfee BackDoor.Bifrost.899
BackDoor-CEP!hv.a McAfee BackDoor.Bifrost.917
BackDoor-CEP!hv.a McAfee Trojan.Siggen.4239
BackDoor-CEP!hv.a McAfee Win32.HLLW.Autoruner.9222
BackDoor-CEP!hv.a McAfee BackDoor.Bifrost.1510
BackDoor-CEP!hv.a McAfee Trojan.PWS.Siggen.7261
BackDoor-CEP!hv.a McAfee BackDoor.Bifrost.8103
BackDoor-CEP!hv.a McAfee Win32.HLLW.Autoruner.7876
BackDoor-CEP!hv.a McAfee BackDoor.Bifrost.919
BackDoor-CEP!hv.a McAfee Trojan.DownLoader1.14237
BackDoor-CEP!hv.a McAfee BackDoor.Bifrost.3760
BackDoor-CEP!hv.a McAfee BackDoor.IRC.Sdbot.6004
BackDoor-CEP!hv.a McAfee Win32.HLLW.Autoruner.8608
BackDoor-CEP!hv.a McAfee BackDoor.Bifrost.1631

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.