Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor.Ranky in virus library:

A class of malware that can execute commands from a remote server and allow attackers to remotely control an infected device.

Backdoor.Ranky aliases:

Name Vendor Dr.Web classification name
Backdoor.Ranky Symantec Trojan.Proxy.373
Backdoor.Ranky Symantec Trojan.Proxy.536
Backdoor.Ranky Symantec Trojan.Proxy.189
Backdoor.Ranky Symantec Trojan.Proxy.18
Backdoor.Ranky Symantec Trojan.Hooka
Backdoor.Ranky Symantec Trojan.Proxy.250
Backdoor.Ranky Symantec BackDoor.Muzi
Backdoor.Ranky Symantec Trojan.Proxy.443
Backdoor.Ranky Symantec Trojan.Proxy.73
Backdoor.Ranky Symantec Trojan.Proxy.162
Backdoor.Ranky Symantec Trojan.Proxy.154
Backdoor.Ranky Symantec BackDoor.Cdex
Backdoor.Ranky Symantec Trojan.Proxy.158
Backdoor.Ranky Symantec Trojan.Frank
Backdoor.Ranky Symantec Trojan.Proxy.28
Backdoor.Ranky Symantec Trojan.Proxy.48
Backdoor.Ranky Symantec Trojan.Proxy.98
Backdoor.Ranky Symantec Trojan.Proxy.45056
Backdoor.Ranky Symantec Trojan.Proxy.95
Backdoor.Ranky Symantec Trojan.Proxy.245
Backdoor.Ranky Symantec Trojan.Proxy.26
Backdoor.Ranky Symantec Trojan.Igos
Backdoor.Ranky Symantec BackDoor.Spooler
Backdoor.Ranky Symantec Trojan.Proxy.141
Backdoor.Ranky Symantec Trojan.Proxy.246
Backdoor.Ranky Symantec Trojan.Proxy.110
Backdoor.Ranky Symantec Trojan.Proxy.159
Backdoor.Ranky Symantec Trojan.Proxy.230
Backdoor.Ranky Symantec Trojan.Proxy.86
Backdoor.Ranky Symantec Trojan.Proxy.54
Backdoor.Ranky Symantec Trojan.Proxy.116
Backdoor.Ranky Symantec BackDoor.Puddy
Backdoor.Ranky Symantec Trojan.Proxy.34
Backdoor.Ranky Symantec Trojan.Proxy.20
Backdoor.Ranky Symantec Trojan.Proxy.40
Backdoor.Ranky Symantec Trojan.Proxy.261
Backdoor.Ranky Symantec Trojan.Proxy.520
Backdoor.Ranky Symantec Trojan.Proxy.370
Backdoor.Ranky Symantec Trojan.Proxy.311
Backdoor.Ranky Symantec Trojan.Proxy.139
Backdoor.Ranky Symantec Win32.IRC.Bot.based
Backdoor.Ranky Symantec Trojan.Proxy.39
Backdoor.Ranky Symantec Trojan.Proxy.124
Backdoor.Ranky Symantec Trojan.Proxy.372
Backdoor.Ranky Symantec Trojan.Proxy.36864
Backdoor.Ranky Symantec Trojan.Ranky.39424
Backdoor.Ranky Symantec Trojan.Proxy.137
Backdoor.Ranky Symantec Trojan.Proxy.156
Backdoor.Ranky Symantec Trojan.Proxy.129
Backdoor.Ranky Symantec Trojan.Proxy.517

1 2 3

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.