Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor.Win32.Bifrose.vgr in virus library:

A class of malware that can execute commands from a remote server and allow attackers to remotely control an infected device.

Backdoor.Win32.Bifrose.vgr aliases:

Name Vendor Dr.Web classification name
Backdoor.Win32.Bifrose.vgr VirusBlokAda Trojan.PWS.Shoufan.6
Backdoor.Win32.Bifrose.vgr VirusBlokAda Trojan.Rent.14
Backdoor.Win32.Bifrose.vgr VirusBlokAda Trojan.Click.17794
Backdoor.Win32.Bifrose.vgr VirusBlokAda BackDoor.Klj
Backdoor.Win32.Bifrose.vgr VirusBlokAda BackDoor.IRC.Nagas
Backdoor.Win32.Bifrose.vgr VirusBlokAda Trojan.DownLoader.62318
Backdoor.Win32.Bifrose.vgr VirusBlokAda BackDoor.Bifrost.692
Backdoor.Win32.Bifrose.vgr VirusBlokAda Trojan.DownLoader.63327
Backdoor.Win32.Bifrose.vgr VirusBlokAda BackDoor.Bifrost.831
Backdoor.Win32.Bifrose.vgr VirusBlokAda Trojan.DownLoader.59492
Backdoor.Win32.Bifrose.vgr VirusBlokAda Trojan.KeyLogger.496
Backdoor.Win32.Bifrose.vgr VirusBlokAda Win32.HLLW.MyBot.13
Backdoor.Win32.Bifrose.vgr VirusBlokAda Trojan.PWS.Banker.27812
Backdoor.Win32.Bifrose.vgr VirusBlokAda Win32.HLLW.MyBot
Backdoor.Win32.Bifrose.vgr VirusBlokAda Trojan.DownLoad.33856
Backdoor.Win32.Bifrose.vgr VirusBlokAda Trojan.PWS.Qqpass.400
Backdoor.Win32.Bifrose.vgr VirusBlokAda Trojan.MulDrop.8379
Backdoor.Win32.Bifrose.vgr VirusBlokAda BackDoor.ProRat
Backdoor.Win32.Bifrose.vgr VirusBlokAda BackDoor.Klj.25
Backdoor.Win32.Bifrose.vgr VirusBlokAda BackDoor.Nuclearat.64
Backdoor.Win32.Bifrose.vgr VirusBlokAda Trojan.DownLoader.63959
Backdoor.Win32.Bifrose.vgr VirusBlokAda Trojan.DownLoader.62327
Backdoor.Win32.Bifrose.vgr VirusBlokAda BackDoor.Pigeon.11870
Backdoor.Win32.Bifrose.vgr VirusBlokAda BackDoor.Inge
Backdoor.Win32.Bifrose.vgr VirusBlokAda BackDoor.ProRat.32
Backdoor.Win32.Bifrose.vgr VirusBlokAda BackDoor.Shark
Backdoor.Win32.Bifrose.vgr VirusBlokAda BackDoor.Rpcs
Backdoor.Win32.Bifrose.vgr VirusBlokAda Trojan.DownLoad.38462
Backdoor.Win32.Bifrose.vgr VirusBlokAda Trojan.MulDrop.4019
Backdoor.Win32.Bifrose.vgr VirusBlokAda Trojan.MulDrop.4389
Backdoor.Win32.Bifrose.vgr VirusBlokAda Trojan.DownLoader1.1448
Backdoor.Win32.Bifrose.vgr VirusBlokAda Trojan.DownLoader1.1649
Backdoor.Win32.Bifrose.vgr VirusBlokAda Trojan.DownLoader1.1623
Backdoor.Win32.Bifrose.vgr VirusBlokAda Trojan.DownLoader1.1606
Backdoor.Win32.Bifrose.vgr VirusBlokAda Trojan.DownLoader1.1673
Backdoor.Win32.Bifrose.vgr VirusBlokAda BackDoor.Graybird
Backdoor.Win32.Bifrose.vgr VirusBlokAda Trojan.Peflog.168
Backdoor.Win32.Bifrose.vgr VirusBlokAda Trojan.Siggen.400
Backdoor.Win32.Bifrose.vgr VirusBlokAda Trojan.MulDrop.5643
Backdoor.Win32.Bifrose.vgr VirusBlokAda Trojan.DownLoader.42881
Backdoor.Win32.Bifrose.vgr VirusBlokAda BackDoor.Nuclearat.83
Backdoor.Win32.Bifrose.vgr VirusBlokAda Trojan.DownLoad.39769
Backdoor.Win32.Bifrose.vgr VirusBlokAda Trojan.DownLoad.39760
Backdoor.Win32.Bifrose.vgr VirusBlokAda Trojan.PWS.Trillian.12
Backdoor.Win32.Bifrose.vgr VirusBlokAda BackDoor.Pigeon.3376
Backdoor.Win32.Bifrose.vgr VirusBlokAda Win32.HLLW.SpyBot
Backdoor.Win32.Bifrose.vgr VirusBlokAda Trojan.MulDrop.13062
Backdoor.Win32.Bifrose.vgr VirusBlokAda BackDoor.IRC.Sdbot.3111
Backdoor.Win32.Bifrose.vgr VirusBlokAda BackDoor.Poison.696
Backdoor.Win32.Bifrose.vgr Kaspersky Trojan.MulDrop.15011

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.