Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor:Win32/Bifrose.ACI aliases:

Name Vendor Dr.Web classification name
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Bifrost.831
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Bifrost.740
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Bifrost.517
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Bifrost.824
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Bifrost.637
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Bifrost.834
Backdoor:Win32/Bifrose.ACI Microsoft Trojan.MulDrop.27760
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Bifrost.829
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Bifrost.569
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Bifrost.515
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Bifrost.573
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Bifrost.833
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Bifrost
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Bifrost.779
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Bifrost.835
Backdoor:Win32/Bifrose.ACI Microsoft Trojan.KillFiles.733
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Bifrost.582
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Bifrost.917
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Bifrost.691
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Bifrost.519
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Bifrost.57
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Bifrost.906
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Bifrost.518
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Bifrost.473
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Bifrost.61
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Bifrost.580
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Bifrost.571
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Bifrost.578
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Bifrost.756
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Pigeon.20383
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Bifrost.576
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Bifrost.583
Backdoor:Win32/Bifrose.ACI Microsoft Trojan.PWS.Qqpass.400
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Bifrost.755
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Bifrost.692
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Bifrost.796
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Bifrost.1009
Backdoor:Win32/Bifrose.ACI Microsoft Trojan.Packed.158
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Bifrost.66
Backdoor:Win32/Bifrose.ACI Microsoft Trojan.Packed.650
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.ProRat.411
Backdoor:Win32/Bifrose.ACI Microsoft Trojan.MulDrop.12389
Backdoor:Win32/Bifrose.ACI Microsoft Trojan.Packed.418
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Bifrost.567
Backdoor:Win32/Bifrose.ACI Microsoft Trojan.Hooker.21052
Backdoor:Win32/Bifrose.ACI Microsoft Trojan.MulDrop.13334
Backdoor:Win32/Bifrose.ACI Microsoft BackDoor.Bifrost.932
Backdoor:Win32/Bifrose.ACI Microsoft Trojan.Siggen.4303
Backdoor:Win32/Bifrose.ACI Microsoft Trojan.MulDrop.5759
Backdoor:Win32/Bifrose.ACI Microsoft Win32.HLLW.Autoruner.15807

1 2 3 4 5 6

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.