Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor:Win32/Tofsee.F aliases:

Name Vendor Dr.Web classification name
Backdoor:Win32/Tofsee.F Microsoft Trojan.Proxy.1979
Backdoor:Win32/Tofsee.F Microsoft Trojan.Spambot.3272
Backdoor:Win32/Tofsee.F Microsoft BackDoor.Rbot.22
Backdoor:Win32/Tofsee.F Microsoft Trojan.Spambot.2401
Backdoor:Win32/Tofsee.F Microsoft Trojan.Spambot.2538
Backdoor:Win32/Tofsee.F Microsoft Trojan.Spambot
Backdoor:Win32/Tofsee.F Microsoft Trojan.Spambot.4336
Backdoor:Win32/Tofsee.F Microsoft BackDoor.BlackHole.3071
Backdoor:Win32/Tofsee.F Microsoft BackDoor.Zoner.2
Backdoor:Win32/Tofsee.F Microsoft Trojan.Spambot.3106
Backdoor:Win32/Tofsee.F Microsoft Trojan.Spambot.3196
Backdoor:Win32/Tofsee.F Microsoft Trojan.Spambot.3330
Backdoor:Win32/Tofsee.F Microsoft BackDoor.BlackHole.2403
Backdoor:Win32/Tofsee.F Microsoft Trojan.PWS.Bucket
Backdoor:Win32/Tofsee.F Microsoft Trojan.Spambot.3386
Backdoor:Win32/Tofsee.F Microsoft Trojan.Spambot.4481
Backdoor:Win32/Tofsee.F Microsoft Trojan.Spambot.4630
Backdoor:Win32/Tofsee.F Microsoft Trojan.Spambot.4321
Backdoor:Win32/Tofsee.F Microsoft Trojan.Spambot.3139
Backdoor:Win32/Tofsee.F Microsoft Trojan.Packed.154
Backdoor:Win32/Tofsee.F Microsoft Trojan.Virtumod.based.18
Backdoor:Win32/Tofsee.F Microsoft Trojan.Ascesso
Backdoor:Win32/Tofsee.F Microsoft BackDoor.Siggen.496
Backdoor:Win32/Tofsee.F Microsoft Trojan.Spambot.3554
Backdoor:Win32/Tofsee.F Microsoft Trojan.Packed.683
Backdoor:Win32/Tofsee.F Microsoft Trojan.Spambot.4631
Backdoor:Win32/Tofsee.F Microsoft BackDoor.Maper
Backdoor:Win32/Tofsee.F Microsoft Trojan.Spambot.3003
Backdoor:Win32/Tofsee.F Microsoft Trojan.Spambot.2933
Backdoor:Win32/Tofsee.F Microsoft Trojan.Spambot.origin
Backdoor:Win32/Tofsee.F Microsoft BackDoor.Tofsee
Backdoor:Win32/Tofsee.F Microsoft Trojan.Spambot.4651
Backdoor:Win32/Tofsee.F Microsoft Trojan.Spambot.4528
Backdoor:Win32/Tofsee.F Microsoft Trojan.DownLoader.35829
Backdoor:Win32/Tofsee.F Microsoft Trojan.Spambot.7944
Backdoor:Win32/Tofsee.F Microsoft BackDoor.IRC.Spbot
Backdoor:Win32/Tofsee.F Microsoft Trojan.Spambot.4530
Backdoor:Win32/Tofsee.F Microsoft Trojan.DownLoader.10831
Backdoor:Win32/Tofsee.F Microsoft BackDoor.Zoner
Backdoor:Win32/Tofsee.F Microsoft Trojan.PWS.BlackHole.1
Backdoor:Win32/Tofsee.F Microsoft Trojan.Siggen.5720
Backdoor:Win32/Tofsee.F Microsoft Trojan.Packed.18626
Backdoor:Win32/Tofsee.F Microsoft Trojan.Siggen.6197
Backdoor:Win32/Tofsee.F Microsoft BackDoor.Tofsee.4

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.