FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

New Malware.b aliases:

Name Vendor Dr.Web classification name
New Malware.b McAfee BackDoor.Facil
New Malware.b McAfee Trojan.MulDrop.1300
New Malware.b McAfee BackDoor.Sentry.11
New Malware.b McAfee Trojan.Neck.10
New Malware.b McAfee Trojan.Ircnot
New Malware.b McAfee BackDoor.Sentry.10
New Malware.b McAfee Trojan.MulDrop.2903
New Malware.b McAfee Trojan.DownLoader.5123
New Malware.b McAfee BackDoor.IRC.Morda
New Malware.b McAfee Trojan.Platan
New Malware.b McAfee BackDoor.Phoenix.172
New Malware.b McAfee Win32.HLLW.Spreader.11
New Malware.b McAfee Trojan.Sinop
New Malware.b McAfee BackDoor.Harvester
New Malware.b McAfee Trojan.KeyLogger.334
New Malware.b McAfee Trojan.ProAgent.11
New Malware.b McAfee Trojan.KeyLogger.188
New Malware.b McAfee Trojan.PWS.Iliya.22
New Malware.b McAfee Trojan.PWS.MiniLD
New Malware.b McAfee Trojan.AVKill.110
New Malware.b McAfee AVKill.Generator
New Malware.b McAfee BackDoor.Nuspy
New Malware.b McAfee BackDoor.Vatosajan
New Malware.b McAfee BackDoor.Generic.930
New Malware.b McAfee BackDoor.Psychward
New Malware.b McAfee BackDoor.Pazus.19
New Malware.b McAfee BackDoor.Ehks.20
New Malware.b McAfee BackDoor.Subeb
New Malware.b McAfee BackDoor.Polli
New Malware.b McAfee BackDoor.Latinus.23
New Malware.b McAfee BackDoor.AntiLame
New Malware.b McAfee Trojan.PWS.LWteam
New Malware.b McAfee BackDoor.IRC.Dfg.28
New Malware.b McAfee Trojan.PWS.Siblove
New Malware.b McAfee Trojan.PWS.Eps.151
New Malware.b McAfee BackDoor.Zaliv.20
New Malware.b McAfee Trojan.ProAgent.12
New Malware.b McAfee Trojan.HippyNotify
New Malware.b McAfee BackDoor.PowerSpider
New Malware.b McAfee BackDoor.Pigeon.3
New Malware.b McAfee BackDoor.IRC.Sdbot
New Malware.b McAfee BackDoor.IRC.Colpoint.3
New Malware.b McAfee BackDoor.IRC.Nafan
New Malware.b McAfee BackDoor.IRC.Winbd
New Malware.b McAfee BackDoor.AF
New Malware.b McAfee Trojan.PWS.Demha
New Malware.b McAfee Trojan.PWS.Snagger
New Malware.b McAfee Trojan.PWS.Agent
New Malware.b McAfee Trojan.Wink.503
New Malware.b McAfee Trojan.KeyLogger.166

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

Dr.Web © Doctor Web
2003 — 2022

Doctor Web is a Russian cybersecurity company focused on threat detection, prevention and response technologies.