Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Generic BackDoor.ba aliases:

Name Vendor Dr.Web classification name
Generic BackDoor.ba McAfee Trojan.DownLoader.2038
Generic BackDoor.ba McAfee BackDoor.Firdem
Generic BackDoor.ba McAfee Trojan.MulDrop.1161
Generic BackDoor.ba McAfee Win32.HLLW.Agobot
Generic BackDoor.ba McAfee BackDoor.Rat.22
Generic BackDoor.ba McAfee BackDoor.IRC.Proxey
Generic BackDoor.ba McAfee BackDoor.OptixPro.132
Generic BackDoor.ba McAfee BackDoor.Nels
Generic BackDoor.ba McAfee BackDoor.Jeffoz
Generic BackDoor.ba McAfee BackDoor.Lithium.102
Generic BackDoor.ba McAfee BackDoor.Insti.40
Generic BackDoor.ba McAfee BackDoor.Only
Generic BackDoor.ba McAfee BackDoor.Cia.23
Generic BackDoor.ba McAfee BackDoor.Death.27
Generic BackDoor.ba McAfee BackDoor.Beast.207
Generic BackDoor.ba McAfee BackDoor.Beast.206
Generic BackDoor.ba McAfee BackDoor.Banito
Generic BackDoor.ba McAfee Trojan.MulDrop.2220
Generic BackDoor.ba McAfee BackDoor.Tamer
Generic BackDoor.ba McAfee Trojan.PWS.Puni
Generic BackDoor.ba McAfee Trojan.PWS.Kap
Generic BackDoor.ba McAfee Trojan.MulDrop.2077
Generic BackDoor.ba McAfee Trojan.KeyLogger.90
Generic BackDoor.ba McAfee Trojan.Proxy.102
Generic BackDoor.ba McAfee Exploit.WebDav
Generic BackDoor.ba McAfee Trojan.SCKeyLog.20
Generic BackDoor.ba McAfee Trojan.PWS.Nutlook
Generic BackDoor.ba McAfee BackDoor.Punt
Generic BackDoor.ba McAfee Trojan.PWS.Vipgsm
Generic BackDoor.ba McAfee BackDoor.Ralf
Generic BackDoor.ba McAfee Trojan.Proxy.110
Generic BackDoor.ba McAfee Program.FireDaemon
Generic BackDoor.ba McAfee Trojan.MyRunner
Generic BackDoor.ba McAfee BackDoor.Generic.832
Generic BackDoor.ba McAfee BackDoor.Pigeon.48
Generic BackDoor.ba McAfee BackDoor.IrcContact
Generic BackDoor.ba McAfee BackDoor.Mosu
Generic BackDoor.ba McAfee BackDoor.Dogmile
Generic BackDoor.ba McAfee BackDoor.IRC.Sdbot.based
Generic BackDoor.ba McAfee BackDoor.Bifrost.11
Generic BackDoor.ba McAfee BackDoor.EggDrop.17
Generic BackDoor.ba McAfee BackDoor.Flux
Generic BackDoor.ba McAfee BackDoor.Ioftpd
Generic BackDoor.ba McAfee BackDoor.Funmaker
Generic BackDoor.ba McAfee BackDoor.Assasin.21
Generic BackDoor.ba McAfee BackDoor.Pigeon
Generic BackDoor.ba McAfee BackDoor.HackDef.100
Generic BackDoor.ba McAfee BackDoor.Wolf.14
Generic BackDoor.ba McAfee BackDoor.Wolf.16
Generic BackDoor.ba McAfee BackDoor.IRC.Sdbot

1 2 3

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.