Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

New Malware.u aliases:

Name Vendor Dr.Web classification name
New Malware.u McAfee BackDoor.Generic.1401
New Malware.u McAfee BackDoor.BlackHole.2288
New Malware.u McAfee BackDoor.Phime
New Malware.u McAfee BackDoor.Pigeon.3862
New Malware.u McAfee BackDoor.Pigeon.5406
New Malware.u McAfee Trojan.DownLoader.27697
New Malware.u McAfee BackDoor.Beizhu.725
New Malware.u McAfee BackDoor.Beizhu.719
New Malware.u McAfee Trojan.MulDrop.5786
New Malware.u McAfee BackDoor.Pigeon.797
New Malware.u McAfee Trojan.PWS.Banker.21395
New Malware.u McAfee Trojan.PWS.Gamania.5888
New Malware.u McAfee Win32.HLLW.Autoruner.911
New Malware.u McAfee Trojan.MulDrop.8794
New Malware.u McAfee Trojan.PWS.Banker.1899
New Malware.u McAfee Trojan.DownLoad.3295
New Malware.u McAfee BackDoor.Pigeon.12870
New Malware.u McAfee BackDoor.Pigeon.7125
New Malware.u McAfee BackDoor.Pigeon.3338
New Malware.u McAfee BackDoor.Pigeon.9943
New Malware.u McAfee Trojan.DownLoader.8074
New Malware.u McAfee Trojan.KeyLogger.1961
New Malware.u McAfee Trojan.MulDrop.9434
New Malware.u McAfee BackDoor.Pigeon.7937
New Malware.u McAfee BackDoor.Remote.41
New Malware.u McAfee BackDoor.BlackHole.origin
New Malware.u McAfee BackDoor.Pigeon.13687
New Malware.u McAfee BackDoor.Pigeon.7888
New Malware.u McAfee Trojan.KeyLogger.353
New Malware.u McAfee Flooder.Mytag
New Malware.u McAfee Adware.Dmad
New Malware.u McAfee BackDoor.Pigeon.1974
New Malware.u McAfee BackDoor.Pigeon.8306
New Malware.u McAfee Trojan.PWS.Banker.10433
New Malware.u McAfee Trojan.DownLoader.16523
New Malware.u McAfee Trojan.KeyLogger.734
New Malware.u McAfee BackDoor.Pigeon.1789
New Malware.u McAfee Trojan.DownLoader.33043
New Malware.u McAfee Trojan.DownLoader.33411
New Malware.u McAfee Trojan.DownLoader.33044
New Malware.u McAfee Trojan.DownLoader.33050
New Malware.u McAfee Tool.BKill
New Malware.u McAfee Trojan.PWS.Banker.9141
New Malware.u McAfee BackDoor.Pigeon.6075
New Malware.u McAfee BackDoor.Pigeon.9368
New Malware.u McAfee BackDoor.Pigeon.19
New Malware.u McAfee BackDoor.Pigeon.8646
New Malware.u McAfee Trojan.PWS.Legmir.1991
New Malware.u McAfee Trojan.PWS.Gamania.6140
New Malware.u McAfee BackDoor.Nova.10

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.