Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor-CEP.gen.b aliases:

Name Vendor Dr.Web classification name
BackDoor-CEP.gen.b McAfee Trojan.MulDrop.14034
BackDoor-CEP.gen.b McAfee Trojan.MulDrop.12129
BackDoor-CEP.gen.b McAfee Trojan.MulDrop.12876
Backdoor-CEP.gen.b McAfee BackDoor.Bifrost.44
Backdoor-CEP.gen.b McAfee BackDoor.Bifrost.56
BackDoor-CEP.gen.b McAfee Trojan.MulDrop.21058
Backdoor-CEP.gen.b McAfee BackDoor.Insti.113
Backdoor-CEP.gen.b McAfee Trojan.MulDrop.9813
BackDoor-CEP.gen.b McAfee Trojan.MulDrop.18955
BackDoor-CEP.gen.b McAfee Trojan.DownLoader.50258
Backdoor-CEP.gen.b McAfee BackDoor.Bifrost.74
BackDoor-CEP.gen.b McAfee Trojan.Click.17949
BackDoor-CEP.gen.b McAfee Trojan.MulDrop.17227
BackDoor-CEP.gen.b McAfee Trojan.MulDrop.12716
Backdoor-CEP.gen.b McAfee Trojan.MulDrop.3629
Backdoor-CEP.gen.b McAfee BackDoor.Bifrost.73
Backdoor-CEP.gen.b McAfee BackDoor.Bifrost
Backdoor-CEP.gen.b McAfee BackDoor.Bifrost.65
Backdoor-CEP.gen.b McAfee Trojan.Proxy.502
Backdoor-CEP.gen.b McAfee BackDoor.Bifrost.11
BackDoor-CEP.gen.b McAfee Trojan.MulDrop.17010
Backdoor-CEP.gen.b McAfee Trojan.Proxy.993
BackDoor-CEP.gen.b McAfee Trojan.MulDrop.10218
Backdoor-CEP.gen.b McAfee Trojan.MulDrop.6150
BackDoor-CEP.gen.b McAfee Trojan.Siggen.59289
BackDoor-CEP.gen.b McAfee Trojan.MulDrop.9108
BackDoor-CEP.gen.b McAfee Trojan.MulDrop.4545
Backdoor-CEP.gen.b McAfee BackDoor.Bifrost.94
Backdoor-CEP.gen.b McAfee BackDoor.Bifrost.26
BackDoor-CEP.gen.b McAfee Trojan.MulDrop1.4834
BackDoor-CEP.gen.b McAfee Constructor.Siggen.828
Backdoor-CEP.gen.b McAfee BackDoor.Ginwui
BackDoor-CEP.gen.b McAfee Trojan.MulDrop.3130
BackDoor-CEP.gen.b McAfee Trojan.Click.46825
BackDoor-CEP.gen.b McAfee Trojan.MulDrop1.4167
BackDoor-CEP.gen.b McAfee Trojan.MulDrop.18940
BackDoor-CEP.gen.b McAfee Trojan.MulDrop.36287
Backdoor-CEP.gen.b McAfee BackDoor.Bifrost.4843
BackDoor-CEP.gen.b McAfee Trojan.MulDrop.36433
BackDoor-CEP.gen.b McAfee Trojan.MulDrop.50836
BackDoor-CEP.gen.b McAfee Trojan.MulDrop.36936
BackDoor-CEP.gen.b McAfee Trojan.MulDrop.37475

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.