Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Mal_Pai-6 aliases:

Name Vendor Dr.Web classification name
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23063
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23039
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23018
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23007
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22992
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23066
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22987
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23065
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23022
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22993
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23009
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23069
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22973
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22971
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22996
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23046
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22972
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22970
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23045
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22995
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23013
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23008
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22991
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23062
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23037
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23023
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23048
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23042
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23058
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23031
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22983
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23035
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22977
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22984
Mal_Pai-6 Trend Micro BackDoor.Pigeon.4939
Mal_Pai-6 Trend Micro BackDoor.Pigeon.6534
Mal_Pai-6 Trend Micro BackDoor.Pigeon.10680
Mal_Pai-6 Trend Micro BackDoor.Pigeon.8468
Mal_Pai-6 Trend Micro BackDoor.PcClient.780
Mal_Pai-6 Trend Micro BackDoor.PcClient.773
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22644
Mal_Pai-6 Trend Micro BackDoor.Pigeon.5244
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23611
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23603
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23607
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23615
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23598
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23617
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23622
Mal_Pai-6 Trend Micro BackDoor.Pigeon.1271

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.