Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Mal_Pai-6 aliases:

Name Vendor Dr.Web classification name
Mal_Pai-6 Trend Micro BackDoor.Pigeon.5162
Mal_Pai-6 Trend Micro BackDoor.Pigeon.10300
Mal_Pai-6 Trend Micro BackDoor.Pigeon.6031
Mal_Pai-6 Trend Micro BackDoor.Pigeon.2387
Mal_Pai-6 Trend Micro BackDoor.Pigeon.1930
Mal_Pai-6 Trend Micro BackDoor.Pigeon.4420
Mal_Pai-6 Trend Micro BackDoor.Pigeon.9491
Mal_Pai-6 Trend Micro BackDoor.Pigeon.3479
Mal_Pai-6 Trend Micro BackDoor.Pigeon.7497
Mal_Pai-6 Trend Micro BackDoor.Pigeon.8721
Mal_Pai-6 Trend Micro BackDoor.Pigeon.2383
Mal_Pai-6 Trend Micro BackDoor.Pigeon.5567
Mal_Pai-6 Trend Micro BackDoor.Pigeon.2769
Mal_Pai-6 Trend Micro BackDoor.Pigeon.11444
Mal_Pai-6 Trend Micro BackDoor.Pigeon.9256
Mal_Pai-6 Trend Micro BackDoor.Beizhu.743
Mal_Pai-6 Trend Micro BackDoor.Pigeon.8526
Mal_Pai-6 Trend Micro BackDoor.Pigeon.13226
Mal_Pai-6 Trend Micro BackDoor.Pigeon.8543
Mal_Pai-6 Trend Micro BackDoor.Pigeon.8572
Mal_Pai-6 Trend Micro BackDoor.Pigeon.5581
Mal_Pai-6 Trend Micro BackDoor.Pigeon.662
Mal_Pai-6 Trend Micro Dialer.Accessor
Mal_Pai-6 Trend Micro BackDoor.Pigeon.5420
Mal_Pai-6 Trend Micro BackDoor.Pigeon.8790
Mal_Pai-6 Trend Micro BackDoor.Pigeon.3188
Mal_Pai-6 Trend Micro BackDoor.Pigeon.5148
Mal_Pai-6 Trend Micro BackDoor.Pigeon.6375
Mal_Pai-6 Trend Micro BackDoor.Pigeon.3377
Mal_Pai-6 Trend Micro BackDoor.Pigeon.9268
Mal_Pai-6 Trend Micro BackDoor.Pigeon.15035
Mal_Pai-6 Trend Micro BackDoor.Pigeon.2331
Mal_Pai-6 Trend Micro BackDoor.Pigeon.2787
Mal_Pai-6 Trend Micro BackDoor.Pigeon.7181
Mal_Pai-6 Trend Micro BackDoor.Pigeon.8301
Mal_Pai-6 Trend Micro BackDoor.Pigeon.9898
Mal_Pai-6 Trend Micro BackDoor.Pigeon.2653
Mal_Pai-6 Trend Micro BackDoor.Pigeon.24856
Mal_Pai-6 Trend Micro BackDoor.Pigeon.6644
Mal_Pai-6 Trend Micro Trojan.Iauh
Mal_Pai-6 Trend Micro BackDoor.Pigeon.9657
Mal_Pai-6 Trend Micro BackDoor.Pigeon.1217
Mal_Pai-6 Trend Micro BackDoor.Pigeon.11096
Mal_Pai-6 Trend Micro BackDoor.Pigeon.10353
Mal_Pai-6 Trend Micro BackDoor.Pigeon.4358
Mal_Pai-6 Trend Micro BackDoor.Pigeon.6090
Mal_Pai-6 Trend Micro BackDoor.Beizhu.337
Mal_Pai-6 Trend Micro Trojan.PWS.Webmonier.14
Mal_Pai-6 Trend Micro BackDoor.Pigeon.8791
Mal_Pai-6 Trend Micro BackDoor.Pigeon.3002

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.