Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor.Hupigon.AAAH in virus library:

A class of malware that can execute commands from a remote server and allow attackers to remotely control an infected device.

Backdoor.Hupigon.AAAH aliases:

Name Vendor Dr.Web classification name
Backdoor.Hupigon.AAAH BitDefender BackDoor.Pigeon.11826
Backdoor.Hupigon.AAAH BitDefender BackDoor.Pigeon.14050
Backdoor.Hupigon.AAAH BitDefender Trojan.Proxy.3336
Backdoor.Hupigon.AAAH BitDefender Trojan.MulDrop.13711
Backdoor.Hupigon.AAAH BitDefender Trojan.DownLoader.12792
Backdoor.Hupigon.AAAH BitDefender BackDoor.Pigeon.6173
Backdoor.Hupigon.AAAH BitDefender Trojan.PWS.Qqpass.1095
Backdoor.Hupigon.AAAH BitDefender BackDoor.Pigeon.3983
Backdoor.Hupigon.AAAH BitDefender Trojan.PWS.Tencent
Backdoor.Hupigon.AAAH BitDefender BackDoor.Pigeon.4396
Backdoor.Hupigon.AAAH BitDefender BackDoor.Pigeon.6126
Backdoor.Hupigon.AAAH BitDefender BackDoor.Huai.752
Backdoor.Hupigon.AAAH BitDefender BackDoor.Kbe
Backdoor.Hupigon.AAAH BitDefender BackDoor.Huai.1749
Backdoor.Hupigon.AAAH BitDefender BackDoor.Huai.1383
Backdoor.Hupigon.AAAH BitDefender BackDoor.Huai.1492
Backdoor.Hupigon.AAAH BitDefender BackDoor.Pigeon.6222
Backdoor.Hupigon.AAAH BitDefender BackDoor.Pigeon.6225
Backdoor.Hupigon.AAAH BitDefender BackDoor.Beizhu.210
Backdoor.Hupigon.AAAH BitDefender BackDoor.Pigeon.2198
Backdoor.Hupigon.AAAH BitDefender Trojan.DownLoader.15237
Backdoor.Hupigon.AAAH BitDefender Trojan.Packed.158
Backdoor.Hupigon.AAAH BitDefender Trojan.DownLoader.7059
Backdoor.Hupigon.AAAH BitDefender BackDoor.Pigeon.6620
Backdoor.Hupigon.AAAH BitDefender BackDoor.Wowish
Backdoor.Hupigon.AAAH BitDefender BackDoor.Pigeon.227
Backdoor.Hupigon.AAAH BitDefender BackDoor.Pigeon.3336
Backdoor.Hupigon.AAAH BitDefender BackDoor.Graybird
Backdoor.Hupigon.AAAH BitDefender BackDoor.Pigeon.7360
Backdoor.Hupigon.AAAH BitDefender BackDoor.Pigeon.3624
Backdoor.Hupigon.AAAH BitDefender BackDoor.Pigeon.2876
Backdoor.Hupigon.AAAH BitDefender BackDoor.Huai.2047
Backdoor.Hupigon.AAAH BitDefender BackDoor.Pigeon.5206
Backdoor.Hupigon.AAAH BitDefender BackDoor.Pigeon.2843
Backdoor.Hupigon.AAAH BitDefender BackDoor.Pigeon.194
Backdoor.Hupigon.AAAH BitDefender Trojan.PWS.Gamania.4189
Backdoor.Hupigon.AAAH BitDefender BackDoor.Pigeon.6180
Backdoor.Hupigon.AAAH BitDefender BackDoor.Pigeon.2069
Backdoor.Hupigon.AAAH BitDefender BackDoor.Klj
Backdoor.Hupigon.AAAH BitDefender BackDoor.Huai.2449
Backdoor.Hupigon.AAAH BitDefender BackDoor.Pigeon.2558
Backdoor.Hupigon.AAAH BitDefender Trojan.DownLoader.59037
Backdoor.Hupigon.AAAH BitDefender Trojan.DownLoad.59212
Backdoor.Hupigon.AAAH BitDefender BackDoor.Pigeon.3646
Backdoor.Hupigon.AAAH BitDefender Trojan.MulDrop.16231
Backdoor.Hupigon.AAAH BitDefender BackDoor.Pigeon.13065
Backdoor.Hupigon.AAAH BitDefender Trojan.MulDrop.9318
Backdoor.Hupigon.AAAH BitDefender BackDoor.Pigeon.9316
Backdoor.Hupigon.AAAH BitDefender BackDoor.Pigeon.3963
Backdoor.Hupigon.AAAH BitDefender BackDoor.Pigeon.11728

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.