Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BehavesLike:Trojan.HangUp aliases:

Name Vendor Dr.Web classification name
BehavesLike:Trojan.HangUp BitDefender Dialer.Irus
BehavesLike:Trojan.HangUp BitDefender Dialer.Chiado
BehavesLike:Trojan.HangUp BitDefender Trojan.Inacmed
BehavesLike:Trojan.HangUp BitDefender Dialer.Tiny
BehavesLike:Trojan.HangUp BitDefender Dialer.Invis
BehavesLike:Trojan.HangUp BitDefender Dialer.Seksdial
BehavesLike:Trojan.HangUp BitDefender Dialer.Buon
BehavesLike:Trojan.HangUp BitDefender Dialer.Wanadoo
BehavesLike:Trojan.HangUp BitDefender Dialer.Secret
BehavesLike:Trojan.HangUp BitDefender Dialer.MediaSwitch
BehavesLike:Trojan.HangUp BitDefender Dialer.Serenta
BehavesLike:Trojan.HangUp BitDefender Dialer.Tibs
BehavesLike:Trojan.HangUp BitDefender Dialer.Papusu.2
BehavesLike:Trojan.HangUp BitDefender Dialer.Xnet
BehavesLike:Trojan.HangUp BitDefender Dialer.Benvenuto
BehavesLike:Trojan.HangUp BitDefender Dialer.Siggen.1
BehavesLike:Trojan.HangUp BitDefender BackDoor.Xbak
BehavesLike:Trojan.HangUp BitDefender Dialer.Prbx
BehavesLike:Trojan.HangUp BitDefender Dialer.Benvenuto.7
BehavesLike:Trojan.HangUp BitDefender Dialer.Premium
BehavesLike:Trojan.HangUp BitDefender Dialer.Accessor
BehavesLike:Trojan.HangUp BitDefender BackDoor.Xbak.6
BehavesLike:Trojan.HangUp BitDefender BackDoor.IRC.Sbot.63
BehavesLike:Trojan.HangUp BitDefender Dialer.Tronyx
BehavesLike:Trojan.HangUp BitDefender Dialer.EroDial
BehavesLike:Trojan.HangUp BitDefender Dialer.Kotu
BehavesLike:Trojan.HangUp BitDefender Dialer.Rasch
BehavesLike:Trojan.HangUp BitDefender Dialer.Iva
BehavesLike:Trojan.HangUp BitDefender BackDoor.Shell
BehavesLike:Trojan.HangUp BitDefender Dialer.Little
BehavesLike:Trojan.HangUp BitDefender Trojan.Click.26343
BehavesLike:Trojan.HangUp BitDefender Trojan.DownLoad1.35434
BehavesLike:Trojan.HangUp BitDefender Trojan.DownLoad1.40075
BehavesLike:Trojan.HangUp BitDefender Trojan.Siggen.62247
BehavesLike:Trojan.HangUp BitDefender Trojan.Siggen.63124
BehavesLike:Trojan.HangUp BitDefender Adware.Dmad
BehavesLike:Trojan.HangUp BitDefender Trojan.Siggen.56552
BehavesLike:Trojan.HangUp BitDefender Trojan.Siggen.63504
BehavesLike:Trojan.HangUp BitDefender Trojan.PWS.Panda.114

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.