Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

IRC/BackDoor.SdBot aliases:

Name Vendor Dr.Web classification name
IRC/BackDoor.SdBot AVG Win32.HLLW.MyBot
IRC/BackDoor.SdBot AVG BackDoor.IRC.Sdbot.529
IRC/BackDoor.SdBot AVG Win32.HLLW.MyBot.based
IRC/BackDoor.SdBot AVG BackDoor.IRC.Sdbot.385
IRC/BackDoor.SdBot AVG BackDoor.IRC.Sdbot.577
IRC/BackDoor.SdBot AVG BackDoor.Bla.52
IRC/BackDoor.SdBot AVG BackDoor.Ninja
IRC/BackDoor.SdBot AVG BackDoor.IRC.Sdbot
IRC/BackDoor.SdBot AVG Win32.HLLW.Morw
IRC/BackDoor.SdBot AVG BackDoor.IRC.Sdbot.819
IRC/BackDoor.SdBot AVG BackDoor.IRC.Papas
IRC/BackDoor.SdBot AVG BackDoor.IRC.Sdbot.5
IRC/BackDoor.SdBot AVG BackDoor.IRC.Sdbot.based
IRC/BackDoor.SdBot AVG IRC.Xbot
IRC/BackDoor.SdBot AVG Win32.IRC.Bot.based
IRC/BackDoor.SdBot AVG BackDoor.IRC.Sdbot.12
IRC/BackDoor.SdBot AVG BackDoor.IRC.Sdbot.912
IRC/BackDoor.SdBot AVG Win32.HLLW.MyBot.225
IRC/BackDoor.SdBot AVG BackDoor.IRC.Sdbot.2509
IRC/BackDoor.SdBot AVG BackDoor.IRC.Sdbot.233
IRC/BackDoor.SdBot AVG BackDoor.IRC.Sdbot.235
IRC/BackDoor.SdBot AVG Win32.HLLW.Konslbot
IRC/BackDoor.SdBot AVG Trojan.MulDrop.14610
IRC/BackDoor.SdBot AVG Win32.HLLW.MyBot.132
IRC/BackDoor.SdBot AVG BackDoor.IRC.Sdbot.31264
IRC/BackDoor.SdBot AVG BackDoor.IRC.Sdbot.551
IRC/BackDoor.SdBot AVG BackDoor.IRC.Sdbot.371
IRC/BackDoor.SdBot AVG BackDoor.IRC.Sdbot.333
IRC/BackDoor.SdBot AVG BackDoor.IRC.Sdbot.1740
IRC/BackDoor.SdBot AVG Trojan.Welkom.13312
IRC/BackDoor.SdBot AVG Trojan.MulDrop.265
IRC/BackDoor.SdBot AVG BackDoor.IRC.Xbot
IRC/BackDoor.SdBot AVG Win32.HLLW.Tanked.13
IRC/BackDoor.SdBot AVG BackDoor.IRC.Sdbot.414
IRC/BackDoor.SdBot AVG BackDoor.IRC.Sdbot.6
IRC/BackDoor.SdBot AVG Trojan.Egg
IRC/BackDoor.SdBot AVG Win32.HLLW.Agobot.2
IRC/BackDoor.SdBot AVG BackDoor.IRC.Sdbot.30670
IRC/BackDoor.SdBot AVG BackDoor.IRC.EggDrop.25
IRC/BackDoor.SdBot AVG Win32.SdDrop.1
IRC/BackDoor.SdBot AVG Win32.HLLW.MyBot.22
IRC/BackDoor.SdBot AVG Win32.HLLW.SpyBot.223
IRC/BackDoor.SdBot AVG Win32.IRC.Bot.119
IRC/BackDoor.SdBot AVG Win32.HLLW.MyBot.35
IRC/BackDoor.SdBot AVG BackDoor.IRC.Sdbot.5279
IRC/BackDoor.SdBot AVG Win32.HLLW.SpyBot

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.