Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

New Malware.u aliases:

Name Vendor Dr.Web classification name
New Malware.u McAfee BackDoor.Beizhu.800
New Malware.u McAfee BackDoor.Beizhu.734
New Malware.u McAfee BackDoor.Beizhu.1197
New Malware.u McAfee BackDoor.Pigeon.3336
New Malware.u McAfee BackDoor.Pigeon.9578
New Malware.u McAfee BackDoor.Huai.1043
New Malware.u McAfee BackDoor.Huai.2758
New Malware.u McAfee Tool.Smsspam
New Malware.u McAfee BackDoor.Attacker
New Malware.u McAfee Trojan.DownLoader.39222
New Malware.u McAfee BackDoor.King
New Malware.u McAfee Tool.Diy
New Malware.u McAfee Tool.Synbomb
New Malware.u McAfee BackDoor.Pigeon.3142
New Malware.u McAfee BackDoor.Pigeon.8355
New Malware.u McAfee Trojan.Proxy.2852
New Malware.u McAfee Trojan.DownLoader.47949
New Malware.u McAfee Trojan.PWS.Qqrobber.176
New Malware.u McAfee BackDoor.IRC.Sdbot.2984
New Malware.u McAfee Trojan.MulDrop.7047
New Malware.u McAfee Trojan.MulDrop.6159
New Malware.u McAfee BackDoor.Generic.1553
New Malware.u McAfee BackDoor.Pigeon.475
New Malware.u McAfee BackDoor.Beizhu.595
New Malware.u McAfee BackDoor.BlackHole
New Malware.u McAfee BackDoor.Pigeon.5116
New Malware.u McAfee BackDoor.Shelem.10
New Malware.u McAfee Trojan.PWS.Lineage.4438
New Malware.u McAfee BackDoor.Pigeon.1623
New Malware.u McAfee Trojan.DownLoader.35294
New Malware.u McAfee Trojan.PWS.Noway
New Malware.u McAfee BackDoor.Singu
New Malware.u McAfee BackDoor.Pigeon.9311
New Malware.u McAfee Trojan.Inject.3515
New Malware.u McAfee Trojan.Filespy.5
New Malware.u McAfee Trojan.Inject.2033
New Malware.u McAfee Trojan.MulDrop.13602
New Malware.u McAfee Trojan.PWS.LDPinch.134
New Malware.u McAfee BackDoor.HackDef.412
New Malware.u McAfee BackDoor.Nogadu
New Malware.u McAfee BackDoor.HotFreez
New Malware.u McAfee Trojan.DownLoader.52587
New Malware.u McAfee Trojan.DownLoader.49433
New Malware.u McAfee BackDoor.Gupt.16
New Malware.u McAfee Trojan.KeyLogger.102
New Malware.u McAfee BackDoor.Cia.28
New Malware.u McAfee Trojan.Huax
New Malware.u McAfee Trojan.Swizzor.3666
New Malware.u McAfee Win32.HLLW.Autoruner.2367
New Malware.u McAfee Trojan.DownLoader.46213

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.