Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor.Win32.Bifrose.la in virus library:

A class of malware that can execute commands from a remote server and allow attackers to remotely control an infected device.

Backdoor.Win32.Bifrose.la aliases:

Name Vendor Dr.Web classification name
Backdoor.Win32.Bifrose.la Kaspersky BackDoor.Bifrost
Backdoor.Win32.Bifrose.la Kaspersky BackDoor.Bifrost.11
Backdoor.Win32.Bifrose.la Kaspersky BackDoor.Bifrost.44
Backdoor.Win32.Bifrose.la Kaspersky BackDoor.ProRat.212
Backdoor.Win32.Bifrose.la VirusBlokAda BackDoor.Sksock
Backdoor.Win32.Bifrose.la Kaspersky Trojan.DownLoader.7059
Backdoor.Win32.Bifrose.la VirusBlokAda BackDoor.Bifrost
Backdoor.Win32.Bifrose.la Kaspersky Trojan.MulDrop.10144
Backdoor.Win32.Bifrose.la VirusBlokAda Trojan.DownLoader.15237
Backdoor.Win32.Bifrose.la Kaspersky Trojan.MulDrop.3768
Backdoor.Win32.Bifrose.la Kaspersky Trojan.MulDrop.4801
Backdoor.Win32.Bifrose.la VirusBlokAda Trojan.MulDrop.4801
Backdoor.Win32.Bifrose.la Kaspersky BackDoor.Bifrost.660
Backdoor.Win32.Bifrose.la VirusBlokAda BackDoor.Bifrost.660
Backdoor.Win32.Bifrose.la VirusBlokAda Trojan.DownLoader.19111
Backdoor.Win32.Bifrose.la VirusBlokAda Trojan.DownLoader.19034
Backdoor.Win32.Bifrose.la Kaspersky BackDoor.ProRat.211
Backdoor.Win32.Bifrose.la Kaspersky Trojan.DownLoader.48449
Backdoor.Win32.Bifrose.la VirusBlokAda Trojan.DownLoader.48449
Backdoor.Win32.Bifrose.la Kaspersky BackDoor.ProRat.177
Backdoor.Win32.Bifrose.la VirusBlokAda BackDoor.Bifrost.11
Backdoor.Win32.Bifrose.la VirusBlokAda Trojan.DownLoader.19112
Backdoor.Win32.Bifrose.la VirusBlokAda BackDoor.War
Backdoor.Win32.Bifrose.la VirusBlokAda Trojan.MulDrop.4410
Backdoor.Win32.Bifrose.la VirusBlokAda Trojan.DownLoader.36211
Backdoor.Win32.Bifrose.la VirusBlokAda Trojan.DownLoader.34723
Backdoor.Win32.Bifrose.la VirusBlokAda Trojan.DownLoader.37499
Backdoor.Win32.Bifrose.la VirusBlokAda Trojan.DownLoader.36415
Backdoor.Win32.Bifrose.la VirusBlokAda Trojan.DownLoad.27561
Backdoor.Win32.Bifrose.la VirusBlokAda Trojan.DownLoader.38027
Backdoor.Win32.Bifrose.la VirusBlokAda BackDoor.IRC.Sdbot.2751
Backdoor.Win32.Bifrose.la VirusBlokAda Trojan.DownLoader.37921
Backdoor.Win32.Bifrose.la VirusBlokAda Trojan.DownLoader.9852
Backdoor.Win32.Bifrose.la VirusBlokAda Trojan.DownLoader.9716
Backdoor.Win32.Bifrose.la VirusBlokAda Win32.HLLW.Hutley
Backdoor.Win32.Bifrose.la VirusBlokAda Trojan.DownLoad.9820
Backdoor.Win32.Bifrose.la VirusBlokAda BackDoor.Indeec.54
Backdoor.Win32.Bifrose.la VirusBlokAda Trojan.Pehrer
Backdoor.Win32.Bifrose.la VirusBlokAda Win32.HLLW.Autoruner.5050
Backdoor.Win32.Bifrose.la VirusBlokAda Trojan.DownLoader.3413
Backdoor.Win32.Bifrose.la VirusBlokAda Trojan.DownLoader.1120
Backdoor.Win32.Bifrose.la VirusBlokAda Trojan.KeyLogger.339
Backdoor.Win32.Bifrose.la VirusBlokAda Trojan.StartPage.236
Backdoor.Win32.Bifrose.la VirusBlokAda Trojan.StartPage.135
Backdoor.Win32.Bifrose.la VirusBlokAda BackDoor.EggDrop.17
Backdoor.Win32.Bifrose.la VirusBlokAda Trojan.Juwo
Backdoor.Win32.Bifrose.la VirusBlokAda Trojan.Proxy.993
Backdoor.Win32.Bifrose.la VirusBlokAda Trojan.DownLoader.46457
Backdoor.Win32.Bifrose.la Kaspersky Trojan.PWS.Bonque
Backdoor.Win32.Bifrose.la VirusBlokAda Trojan.DownLoader.52497

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.