Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Generic BackDoor.j aliases:

Name Vendor Dr.Web classification name
Generic BackDoor.j McAfee Trojan.Proxy.172
Generic BackDoor.j McAfee BackDoor.Remcon.132
Generic BackDoor.j McAfee BackDoor.IRC.Lola
Generic BackDoor.j McAfee Trojan.Proxy.205
Generic BackDoor.j McAfee Trojan.Proxy.215
Generic BackDoor.j McAfee BackDoor.Cdex
Generic BackDoor.j McAfee BackDoor.Feed
Generic BackDoor.j McAfee Trojan.Proxy.347
Generic BackDoor.j McAfee Trojan.MulDrop.1296
Generic BackDoor.j McAfee BackDoor.Nutkle
Generic BackDoor.j McAfee BackDoor.Leviat
Generic BackDoor.j McAfee BackDoor.Mutabor
Generic BackDoor.j McAfee Win32.IRC.Bot.based
Generic BackDoor.j McAfee Trojan.Proxy.254
Generic BackDoor.j McAfee BackDoor.Yaner.174
Generic BackDoor.j McAfee BackDoor.Lint
Generic BackDoor.j McAfee Trojan.PWS.Marcos
Generic BackDoor.j McAfee BackDoor.Btftp
Generic BackDoor.j McAfee Win32.HLLW.MyBot
Generic BackDoor.j McAfee Trojan.DownLoader.9868
Generic BackDoor.j McAfee Win32.HLLW.Ofni
Generic BackDoor.j McAfee BackDoor.IRC.Sdbot.912
Generic BackDoor.j McAfee BackDoor.Jifu
Generic BackDoor.j McAfee Trojan.EmailSpy
Generic BackDoor.j McAfee Trojan.KeyLogger.1907
Generic BackDoor.j McAfee BackDoor.Image
Generic BackDoor.j McAfee BackDoor.IRC.Blah
Generic BackDoor.j McAfee BackDoor.LameBot
Generic BackDoor.j McAfee BackDoor.Faggoty
Generic BackDoor.j McAfee Trojan.MulDrop.3635
Generic BackDoor.j McAfee BackDoor.Bech
Generic BackDoor.j McAfee Trojan.MulDrop.3879
Generic BackDoor.j McAfee Trojan.MulDrop.1450
Generic BackDoor.j McAfee BackDoor.Jifu.25
Generic BackDoor.j McAfee BackDoor.Connect.12
Generic BackDoor.j McAfee Trojan.StartPage.21155

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.