Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Bredo aliases:

Name Vendor Dr.Web classification name
Cryp_Bredo Trend Micro Trojan.Spambot.4429
Cryp_Bredo Trend Micro Trojan.Spambot.4434
Cryp_Bredo Trend Micro Trojan.MulDrop.31446
Cryp_Bredo Trend Micro Trojan.Spambot.4590
Cryp_Bredo Trend Micro Trojan.DownLoad.41551
Cryp_Bredo Trend Micro Trojan.Spambot.4331
Cryp_Bredo Trend Micro Trojan.Fakealert.4494
Cryp_Bredo Trend Micro Trojan.Spambot.4538
Cryp_Bredo Trend Micro Trojan.Spambot.4539
Cryp_Bredo Trend Micro Trojan.Spambot.4424
Cryp_Bredo Trend Micro Win32.HLLW.Autoruner.6865
Cryp_Bredo Trend Micro Trojan.Spambot.4669
Cryp_Bredo Trend Micro Trojan.Spambot.4465
Cryp_Bredo Trend Micro BackDoor.Agent.17
Cryp_Bredo Trend Micro Trojan.Spambot.3531
Cryp_Bredo Trend Micro Trojan.DownLoad.45099
Cryp_Bredo Trend Micro Trojan.PWS.LDPinch.4308
Cryp_Bredo Trend Micro Trojan.Spambot.4706
Cryp_Bredo Trend Micro Trojan.Spambot.4703
Cryp_Bredo Trend Micro Trojan.Spambot.4677
Cryp_Bredo Trend Micro Trojan.Spambot.4697
Cryp_Bredo Trend Micro Win32.HLLW.Autoruner.6326
Cryp_Bredo Trend Micro Trojan.WinSpy.146
Cryp_Bredo Trend Micro Trojan.Spambot.4408
Cryp_Bredo Trend Micro Trojan.Fakealert.4509
Cryp_Bredo Trend Micro DDoS.5647
Cryp_Bredo Trend Micro Trojan.Fakealert.4812
Cryp_Bredo Trend Micro Trojan.Spambot.4555
Cryp_Bredo Trend Micro Trojan.PWS.Panda.122
Cryp_Bredo Trend Micro Trojan.DownLoad.38666
Cryp_Bredo Trend Micro Trojan.Spambot.4431
Cryp_Bredo Trend Micro Trojan.DownLoad.42082
Cryp_Bredo Trend Micro Trojan.Fakealert.4850
Cryp_Bredo Trend Micro Trojan.PWS.Multi.35
Cryp_Bredo Trend Micro Trojan.Spambot.4615
Cryp_Bredo Trend Micro Trojan.Webmoner.60955
Cryp_Bredo Trend Micro Trojan.PWS.Banker.29662
Cryp_Bredo Trend Micro Trojan.Spambot.4772
Cryp_Bredo Trend Micro Trojan.Fakealert.4960
Cryp_Bredo Trend Micro Trojan.Fakealert.4859
Cryp_Bredo Trend Micro BackDoor.Agent.36
Cryp_Bredo Trend Micro Trojan.PWS.Banker.29945
Cryp_Bredo Trend Micro Trojan.DownLoad.33445
Cryp_Bredo Trend Micro Trojan.Inject.5512
Cryp_Bredo Trend Micro Trojan.Inject.5904
Cryp_Bredo Trend Micro Trojan.PWS.Panda.114
Cryp_Bredo Trend Micro Trojan.DownLoad.48030
Cryp_Bredo Trend Micro Trojan.DownLoad.40399
Cryp_Bredo Trend Micro Trojan.Spambot.4490
Cryp_Bredo Trend Micro Trojan.DownLoad.42459

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.