Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

New Malware.j aliases:

Name Vendor Dr.Web classification name
New Malware.j McAfee BackDoor.IRC.Sdbot.5
New Malware.j McAfee Trojan.Proxy.106
New Malware.j McAfee BackDoor.IRC.Cirilico
New Malware.j McAfee Win32.HLLM.Pepex.1
New Malware.j McAfee BackDoor.IRC.Sdbot.364
New Malware.j McAfee BackDoor.IRC.Sdbot.based
New Malware.j McAfee Win32.HLLW.Tumbi.4
New Malware.j McAfee Win32.HLLM.Generic.174
New Malware.j McAfee Trojan.PWS.Legmir.224
New Malware.j McAfee Trojan.KeyLogger.213
New Malware.j McAfee Trojan.PWS.Banker.739
New Malware.j McAfee Trojan.KeyLogger.195
New Malware.j McAfee Trojan.PWS.Banker.1062
New Malware.j McAfee BackDoor.Generic.918
New Malware.j McAfee Trojan.KeyLogger.255
New Malware.j McAfee BackDoor.IRC.Sdbot.104
New Malware.j McAfee Trojan.PWS.Legmir.256
New Malware.j McAfee Trojan.KeyLogger.65
New Malware.j McAfee Trojan.PWS.Legmir.342
New Malware.j McAfee Trojan.Proxy.134
New Malware.j McAfee Trojan.Proxy.340
New Malware.j McAfee Win32.HLLW.Antinny.36
New Malware.j McAfee Trojan.MulDrop.1669
New Malware.j McAfee BackDoor.IRC.Acidbot
New Malware.j McAfee Trojan.DownLoader.4455
New Malware.j McAfee Trojan.DownLoader.3132
New Malware.j McAfee Trojan.DownLoader.3160
New Malware.j McAfee Trojan.DownLoader.4652
New Malware.j McAfee Trojan.DownLoader.6080
New Malware.j McAfee Trojan.DownLoader.4368
New Malware.j McAfee Trojan.PWS.Gameff
New Malware.j McAfee Trojan.PWS.Gamania
New Malware.j McAfee Trojan.Click.687
New Malware.j McAfee Trojan.Ares.618
New Malware.j McAfee Trojan.DownGod
New Malware.j McAfee Trojan.MulDrop.2715
New Malware.j McAfee Trojan.Svcinst
New Malware.j McAfee Trojan.PWS.Banker.904
New Malware.j McAfee Trojan.PWS.Bancos.60
New Malware.j McAfee BackDoor.Iroffer.1310
New Malware.j McAfee Trojan.Bancdo
New Malware.j McAfee BackDoor.IRC.Wisdom
New Malware.j McAfee BackDoor.Generic.958
New Malware.j McAfee BackDoor.PSClient
New Malware.j McAfee DDoS.Iojik
New Malware.j McAfee BackDoor.Generic.1208
New Malware.j McAfee Win32.HLLW.Natalia
New Malware.j McAfee Win32.Valhala.2048
New Malware.j McAfee Trojan.StartPage.1176
New Malware.j McAfee Trojan.StartPage.901

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.