Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BackDoor-CEP.svr aliases:

Name Vendor Dr.Web classification name
BackDoor-CEP.svr McAfee BackDoor.Bifrost.74
BackDoor-CEP.svr McAfee Trojan.MulDrop.4297
BackDoor-CEP.svr McAfee BackDoor.Bifrost
BackDoor-CEP.svr McAfee Trojan.MulDrop.4529
BackDoor-CEP.svr McAfee BackDoor.Bifrost.53
BackDoor-CEP.svr McAfee Trojan.Proxy.993
BackDoor-CEP.svr McAfee BackDoor.Bifrost.10
BackDoor-CEP.svr McAfee Trojan.MulDrop.4603
BackDoor-CEP.svr McAfee BackDoor.Bifrost.61
BackDoor-CEP.svr McAfee Trojan.Troll
BackDoor-CEP.svr McAfee BackDoor.Bifrost.57
BackDoor-CEP.svr McAfee Trojan.MulDrop.5929
BackDoor-CEP.svr McAfee BackDoor.Pigeon.1604
BackDoor-CEP.svr McAfee Trojan.MulDrop.3949
BackDoor-CEP.svr McAfee Trojan.MulDrop.10218
BackDoor-CEP.svr McAfee Trojan.MulDrop.12723
BackDoor-CEP.svr McAfee BackDoor.Bifrost.11
BackDoor-CEP.svr McAfee Trojan.Inject.764
BackDoor-CEP.svr McAfee Trojan.MulDrop.8384
BackDoor-CEP.svr McAfee Trojan.Inject.3555
BackDoor-CEP.svr McAfee Trojan.MulDrop.10663
BackDoor-CEP.svr McAfee Trojan.MulDrop.12261
BackDoor-CEP.svr McAfee BackDoor.Bifrost.582
BackDoor-CEP.svr McAfee BackDoor.Bifrost.831
BackDoor-CEP.svr McAfee BackDoor.Bifrost.637
BackDoor-CEP.svr McAfee BackDoor.Bifrost.740
BackDoor-CEP.svr McAfee BackDoor.Bifrost.515
BackDoor-CEP.svr McAfee BackDoor.Bifrost.834
BackDoor-CEP.svr McAfee BackDoor.Bifrost.835
BackDoor-CEP.svr McAfee BackDoor.Bifrost.66
BackDoor-CEP.svr McAfee BackDoor.Bifrost.660
BackDoor-CEP.svr McAfee BackDoor.Bifrost.44
BackDoor-CEP.svr McAfee Trojan.PWS.Lineage.4469
BackDoor-CEP.svr McAfee Trojan.PWS.Lineage.4319
BackDoor-CEP.svr McAfee Trojan.PWS.LDPinch.1130
BackDoor-CEP.svr McAfee Trojan.PWS.Lineage.4471
BackDoor-CEP.svr McAfee BackDoor.Bifrost.81
BackDoor-CEP.svr McAfee Trojan.MulDrop.14964
BackDoor-CEP.svr McAfee Trojan.MulDrop.3130
BackDoor-CEP.svr McAfee Trojan.Inject.902
BackDoor-CEP.svr McAfee Trojan.Vbspreader
BackDoor-CEP.svr McAfee Trojan.MulDrop.13062
BackDoor-CEP.svr McAfee BackDoor.Bifrost.691
BackDoor-CEP.svr McAfee Trojan.MulDrop.11191
BackDoor-CEP.svr McAfee Trojan.KeyLogger.819
BackDoor-CEP.svr McAfee Trojan.MulDrop.5925
BackDoor-CEP.svr McAfee Trojan.DownLoader.45473
BackDoor-CEP.svr McAfee Trojan.MulDrop.4545
BackDoor-CEP.svr McAfee Trojan.MulDrop.5956
BackDoor-CEP.svr McAfee Win32.HLLM.Netsky.18353

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.