Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor:Win32/Bifrose aliases:

Name Vendor Dr.Web classification name
Backdoor:Win32/Bifrose Microsoft Trojan.Inject.114
Backdoor:Win32/Bifrose Microsoft BackDoor.Bifrost.482
Backdoor:Win32/Bifrose Microsoft Trojan.MulDrop.11738
Backdoor:Win32/Bifrose Microsoft Trojan.MulDrop.17090
Backdoor:Win32/Bifrose Microsoft Trojan.DownLoader.54878
Backdoor:Win32/Bifrose Microsoft Trojan.Inject.778
Backdoor:Win32/Bifrose Microsoft Trojan.MulDrop.8658
Backdoor:Win32/Bifrose Microsoft Trojan.Webind
Backdoor:Win32/Bifrose Microsoft BackDoor.Pigeon
Backdoor:Win32/Bifrose Microsoft BackDoor.Pigeon.2712
Backdoor:Win32/Bifrose Microsoft Adware.Letscool
Backdoor:Win32/Bifrose Microsoft BackDoor.Pigeon.6903
Backdoor:Win32/Bifrose Microsoft Trojan.MulDrop.17255
Backdoor:Win32/Bifrose Microsoft DDoS.Rincux
Backdoor:Win32/Bifrose Microsoft BackDoor.Bifrost.10
Backdoor:Win32/Bifrose Microsoft Trojan.KillDisk.290
Backdoor:Win32/Bifrose Microsoft BackDoor.Ninja
Backdoor:Win32/Bifrose Microsoft Trojan.Packed.200
Backdoor:Win32/Bifrose Microsoft Trojan.MulDrop.16417
Backdoor:Win32/Bifrose Microsoft Trojan.MulDrop.17658
Backdoor:Win32/Bifrose Microsoft Trojan.Inject.1741
Backdoor:Win32/Bifrose Microsoft Trojan.MulDrop.7058
Backdoor:Win32/Bifrose Microsoft Trojan.MulDrop.15380
Backdoor:Win32/Bifrose Microsoft BackDoor.Bifrost.582
Backdoor:Win32/Bifrose Microsoft BackDoor.Bifrost
Backdoor:Win32/Bifrose Microsoft BackDoor.Bifrost.569
Backdoor:Win32/Bifrose Microsoft BackDoor.Bifrost.44
Backdoor:Win32/Bifrose Microsoft BackDoor.Bifrost.56
Backdoor:Win32/Bifrose Microsoft BackDoor.Bifrost.740
Backdoor:Win32/Bifrose Microsoft Trojan.MulDrop.441
Backdoor:Win32/Bifrose Microsoft Trojan.MulDrop.5617
Backdoor:Win32/Bifrose Microsoft Trojan.MulDrop.15891
Backdoor:Win32/Bifrose Microsoft BackDoor.Bifrost.637
Backdoor:Win32/Bifrose Microsoft BackDoor.Bifrost.779
Backdoor:Win32/Bifrose Microsoft BackDoor.Bifrost.57
Backdoor:Win32/Bifrose Microsoft BackDoor.Beizhu.356
Backdoor:Win32/Bifrose Microsoft BackDoor.Bifrost.24
Backdoor:Win32/Bifrose Microsoft Trojan.DownLoader.26876
Backdoor:Win32/Bifrose Microsoft BackDoor.Pigeon.8325
Backdoor:Win32/Bifrose Microsoft BackDoor.Bifrost.768
Backdoor:Win32/Bifrose Microsoft BackDoor.Pigeon.13052
Backdoor:Win32/Bifrose Microsoft BackDoor.Bifrost.92
Backdoor:Win32/Bifrose Microsoft BackDoor.Bifrost.11
Backdoor:Win32/Bifrose Microsoft BackDoor.Bifrost.48
Backdoor:Win32/Bifrose Microsoft BackDoor.Bifrost.515
Backdoor:Win32/Bifrose Microsoft BackDoor.Pigeon.7744
Backdoor:Win32/Bifrose Microsoft Trojan.MulDrop.4658
Backdoor:Win32/Bifrose Microsoft Trojan.MulDrop.14610
Backdoor:Win32/Bifrose Microsoft Win32.HLLW.Cent.33
Backdoor:Win32/Bifrose Microsoft Win32.HLLW.MyBot.88

1 2 3 4 5 6 7 8 9 10 11 12

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.