Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BackDoor.Bifrost in virus library:

A class of malware that can execute commands from a remote server and allow attackers to remotely control an infected device.

BackDoor.Bifrost aliases:

Name Vendor Dr.Web classification name
Backdoor.Win32.Bifrose.agir Kaspersky BackDoor.Bifrost
Backdoor.Win32.Bifrose.agir VirusBlokAda BackDoor.Bifrost
BackDoor.Generic6.BHY AVG BackDoor.Bifrost
Backdoor.Win32.Wootbot.g VirusBlokAda BackDoor.Bifrost
TROJ_BIFROSE.ZA Trend Micro BackDoor.Bifrost
Backdoor.Win32.Bifrose.awnk Kaspersky BackDoor.Bifrost
Gen:Trojan.Heur.A1E41B0F0F BitDefender BackDoor.Bifrost
BackDoor.Generic2.BOK AVG BackDoor.Bifrost
Backdoor.Win32.Ciadoor.gn Kaspersky BackDoor.Bifrost
BackDoor.Generic5.YUN AVG BackDoor.Bifrost
Trojan:Win32/Anomaly Microsoft BackDoor.Bifrost
Backdoor.Win32.Bifrose.pu Kaspersky BackDoor.Bifrost
BackDoor.Generic2.TFY AVG BackDoor.Bifrost
Backdoor.Win32.Bifrose.pu VirusBlokAda BackDoor.Bifrost
Trojan.Win32.Midgare.ft Kaspersky BackDoor.Bifrost
GenPack:Backdoor.Bifrose.ADR BitDefender BackDoor.Bifrost
Trojan-Dropper.Win32.Agent.apms Kaspersky BackDoor.Bifrost
BackDoor.Generic.MCT AVG BackDoor.Bifrost
Backdoor.Win32.Bifrose.fmv VirusBlokAda BackDoor.Bifrost
PWS:Win32/Ldpinch.BC Microsoft BackDoor.Bifrost
Klone AVG BackDoor.Bifrost
Backdoor.Bifrose.AAGY BitDefender BackDoor.Bifrost
BDS/Bifrose.abt Avira BackDoor.Bifrost
Backdoor.Win32.Bifrose.bmek Kaspersky BackDoor.Bifrost
Backdoor.Win32.Bifrose.bbag Kaspersky BackDoor.Bifrost
BackDoor-CEP!hv.d McAfee BackDoor.Bifrost
Type_Win32 Kaspersky BackDoor.Bifrost
Malware-Cryptor.Win32.General.3 VirusBlokAda BackDoor.Bifrost
Gen:Backdoor.Heur.Bifrose.2010EFFFFF BitDefender BackDoor.Bifrost
Trojan.Generic.1409137 BitDefender BackDoor.Bifrost
Backdoor.Win32.Bifrose.fba Kaspersky BackDoor.Bifrost
VirTool:Win32/Obfuscator.EK Microsoft BackDoor.Bifrost
BDS/Delf.LS Avira BackDoor.Bifrost
BackDoor.Generic2.HEI AVG BackDoor.Bifrost
Backdoor.Bifrose.ZYX BitDefender BackDoor.Bifrost
Trojan.Win32.Midgare.xlr Kaspersky BackDoor.Bifrost
Gen:Backdoor.Heur.Bifrose.82C3F3E3E3 BitDefender BackDoor.Bifrost
Backdoor.Win32.Bifrose.agx Kaspersky BackDoor.Bifrost
BackDoor.Generic8.FWD AVG BackDoor.Bifrost
Backdoor.Bifrose.AGX BitDefender BackDoor.Bifrost
BackDoor.Generic4.XPD AVG BackDoor.Bifrost
Trojan.Peed.Gen BitDefender BackDoor.Bifrost
Generic Dropper!bcr McAfee BackDoor.Bifrost
VirTool:Win32/Vbcrypt.Y Microsoft BackDoor.Bifrost
Trojan-Dropper.Win32.VB.acpq Kaspersky BackDoor.Bifrost
Trojan.VB.Levelup VirusBlokAda BackDoor.Bifrost
Backdoor.Win32.Bifrose.aeo VirusBlokAda BackDoor.Bifrost
Backdoor.Bifrose.AEO BitDefender BackDoor.Bifrost
BackDoor.Generic4.YEX AVG BackDoor.Bifrost
BackDoor.Bifrost VirusBlokAda BackDoor.Bifrost.906

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42

BackDoor.Bifrost in virus library:

BackDoor.Bifrost.7946
BackDoor.Bifrost.8024
BackDoor.Bifrost.8093
BackDoor.Bifrost.8255
BackDoor.Bifrost.8652
BackDoor.Bifrost.8692
BackDoor.Bifrost.8737
BackDoor.Bifrost.8750
BackDoor.Bifrost.8838
BackDoor.Bifrost.8878
BackDoor.Bifrost.8898
BackDoor.Bifrost.8899
BackDoor.Bifrost.9.origin
BackDoor.Bifrost.907
BackDoor.Bifrost.91
BackDoor.Bifrost.9767

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.