Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor.Hupigon.CPB in virus library:

A class of malware that can execute commands from a remote server and allow attackers to remotely control an infected device.

Backdoor.Hupigon.CPB aliases:

Name Vendor Dr.Web classification name
Backdoor.Hupigon.CPB BitDefender BackDoor.Beizhu
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.2303
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.3176
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.2072
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.491
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.1923
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.597
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.516
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.805
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.947
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.857
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.669
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.2470
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.2466
Backdoor.Hupigon.CPB BitDefender Win32.Parite.1
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.1866
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.8949
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.4433
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.6964
Backdoor.Hupigon.CPB BitDefender BackDoor.IRC.Sdbot.2793
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.4357
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.4351
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.3564
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.1915
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.1108
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.1128
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.2219
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.8706
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.9197
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.5126
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.952
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.8455
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.460
Backdoor.Hupigon.CPB BitDefender BackDoor.Graybird
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.11672
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.6925
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.11604
Backdoor.Hupigon.CPB BitDefender Trojan.PWS.Vipgsm
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.7026
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.2876
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.7461
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.3566
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.21851
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.9768
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.4536
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.7235
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.5057
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.2204
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.2254
Backdoor.Hupigon.CPB BitDefender BackDoor.Pigeon.2896

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.