Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Generic BackDoor.u aliases:

Name Vendor Dr.Web classification name
Generic BackDoor.u McAfee BackDoor.WebDor
Generic BackDoor.u McAfee BackDoor.Yourser
Generic BackDoor.u McAfee Trojan.DownLoader.4969
Generic BackDoor.u McAfee Trojan.Proxy.215
Generic BackDoor.u McAfee BackDoor.Masteseq
Generic BackDoor.u McAfee BackDoor.XFlash
Generic BackDoor.u McAfee BackDoor.Himsi
Generic BackDoor.u McAfee BackDoor.RShell
Generic BackDoor.u McAfee Trojan.PWS.Banker.707
Generic BackDoor.u McAfee Trojan.Proxy.110
Generic BackDoor.u McAfee BackDoor.Serpent
Generic BackDoor.u McAfee Trojan.Disabler
Generic BackDoor.u McAfee BackDoor.Zins
Generic BackDoor.u McAfee BackDoor.Gacho
Generic BackDoor.u McAfee BackDoor.DarkMoon.35
Generic BackDoor.u McAfee BackDoor.Beast.207
Generic BackDoor.u McAfee BackDoor.Plunix
Generic BackDoor.u McAfee BackDoor.HangUp.24
Generic BackDoor.u McAfee BackDoor.Widi
Generic BackDoor.u McAfee Trojan.MulDrop.433
Generic BackDoor.u McAfee BackDoor.Graybird
Generic BackDoor.u McAfee BackDoor.Mosu
Generic BackDoor.u McAfee BackDoor.Generic.956
Generic BackDoor.u McAfee BackDoor.Ralf
Generic BackDoor.u McAfee BackDoor.Boro
Generic BackDoor.u McAfee Trojan.Proxy.106
Generic BackDoor.u McAfee Trojan.Click.302
Generic BackDoor.u McAfee Trojan.Proxy.434
Generic BackDoor.u McAfee Flooder.SendMsg
Generic BackDoor.u McAfee BackDoor.Singu
Generic BackDoor.u McAfee Trojan.Svcinst
Generic BackDoor.u McAfee BackDoor.Vbbot
Generic BackDoor.u McAfee BackDoor.Matrix
Generic BackDoor.u McAfee BackDoor.Shadow
Generic BackDoor.u McAfee BackDoor.Remsivc
Generic BackDoor.u McAfee BackDoor.Rat.23
Generic BackDoor.u McAfee BackDoor.Netshadow
Generic BackDoor.u McAfee BackDoor.Nels
Generic BackDoor.u McAfee BackDoor.LMR.20
Generic BackDoor.u McAfee BackDoor.Fxsvc
Generic BackDoor.u McAfee BackDoor.Bifrost.11
Generic BackDoor.u McAfee BackDoor.Assassin.11
Generic BackDoor.u McAfee Trojan.PWS.Gamma
Generic BackDoor.u McAfee BackDoor.Bandito.13
Generic BackDoor.u McAfee BackDoor.PSClient
Generic BackDoor.u McAfee BackDoor.Haxdoor.176
Generic BackDoor.u McAfee BackDoor.FireFly
Generic BackDoor.u McAfee BackDoor.SevenEleven
Generic BackDoor.u McAfee Trojan.Runnetw
Generic BackDoor.u McAfee BackDoor.Pigeon.5

1 2 3 4 5 6 7

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.