Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor:Win32/Ciadoor aliases:

Name Vendor Dr.Web classification name
Backdoor:Win32/Ciadoor Microsoft Trojan.DownLoader.62486
Backdoor:Win32/Ciadoor Microsoft Trojan.MulDrop.5013
Backdoor:Win32/Ciadoor Microsoft BackDoor.Yuri
Backdoor:Win32/Ciadoor Microsoft BackDoor.Cia.123
Backdoor:Win32/Ciadoor Microsoft BackDoor.Redraw
Backdoor:Win32/Ciadoor Microsoft BackDoor.Generic.592
Backdoor:Win32/Ciadoor Microsoft BackDoor.Pigeon.3166
Backdoor:Win32/Ciadoor Microsoft Trojan.Inject.549
Backdoor:Win32/Ciadoor Microsoft BackDoor.Cia.23
Backdoor:Win32/Ciadoor Microsoft BackDoor.Cia
Backdoor:Win32/Ciadoor Microsoft Trojan.DownLoader.62487
Backdoor:Win32/Ciadoor Microsoft BackDoor.Ser.4
Backdoor:Win32/Ciadoor Microsoft BackDoor.IRC.Sdbot.1668
Backdoor:Win32/Ciadoor Microsoft BackDoor.Cia.27
Backdoor:Win32/Ciadoor Microsoft BackDoor.Generic.889
Backdoor:Win32/Ciadoor Microsoft BackDoor.Cia.24
Backdoor:Win32/Ciadoor Microsoft BackDoor.Dyhesous
Backdoor:Win32/Ciadoor Microsoft Trojan.KeyLogger.89
Backdoor:Win32/Ciadoor Microsoft Trojan.MulDrop.634
Backdoor:Win32/Ciadoor Microsoft BackDoor.Generic.586
Backdoor:Win32/Ciadoor Microsoft Trojan.DownLoader.7338
Backdoor:Win32/Ciadoor Microsoft Trojan.KeyLogger.90
Backdoor:Win32/Ciadoor Microsoft BackDoor.IRC.Sdbot.1343
Backdoor:Win32/Ciadoor Microsoft Trojan.KeyLogger.88
Backdoor:Win32/Ciadoor Microsoft BackDoor.Bifrost.57
Backdoor:Win32/Ciadoor Microsoft Trojan.MulDrop.14193
Backdoor:Win32/Ciadoor Microsoft BackDoor.Cia.28
Backdoor:Win32/Ciadoor Microsoft BackDoor.Bifrost
Backdoor:Win32/Ciadoor Microsoft Win32.HLLW.MyBot
Backdoor:Win32/Ciadoor Microsoft BackDoor.Pigeon.7219
Backdoor:Win32/Ciadoor Microsoft BackDoor.Pigeon.8499
Backdoor:Win32/Ciadoor Microsoft BackDoor.Cia.30
Backdoor:Win32/Ciadoor Microsoft BackDoor.Huai.827
Backdoor:Win32/Ciadoor Microsoft BackDoor.Huai.828
Backdoor:Win32/Ciadoor Microsoft Trojan.MulDrop.3963
Backdoor:Win32/Ciadoor Microsoft BackDoor.Bandook.19
Backdoor:Win32/Ciadoor Microsoft BackDoor.Generic.683
Backdoor:Win32/Ciadoor Microsoft Trojan.DownLoader.15554
Backdoor:Win32/Ciadoor Microsoft BackDoor.Nettraf
Backdoor:Win32/Ciadoor Microsoft BackDoor.IRC.Sdbot.941
Backdoor:Win32/Ciadoor Microsoft BackDoor.IRC.Sdbot.797
Backdoor:Win32/Ciadoor Microsoft Trojan.Alchem
Backdoor:Win32/Ciadoor Microsoft BackDoor.Cia.19
Backdoor:Win32/Ciadoor Microsoft BackDoor.Cia.20
Backdoor:Win32/Ciadoor Microsoft Trojan.MulDrop.2088
Backdoor:Win32/Ciadoor Microsoft BackDoor.Generic.956
Backdoor:Win32/Ciadoor Microsoft BackDoor.Cia.18
Backdoor:Win32/Ciadoor Microsoft BackDoor.Cia.22
Backdoor:Win32/Ciadoor Microsoft Trojan.KeyLogger.94
Backdoor:Win32/Ciadoor Microsoft BackDoor.DSNX

1 2 3

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.