Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

New Malware.u aliases:

Name Vendor Dr.Web classification name
New Malware.u McAfee BackDoor.HackDef.527
New Malware.u McAfee Trojan.Proxy.2851
New Malware.u McAfee Trojan.PWS.Legmir.971
New Malware.u McAfee Trojan.DownLoader.23752
New Malware.u McAfee Trojan.DownLoader.60770
New Malware.u McAfee Trojan.DownLoader.60872
New Malware.u McAfee Trojan.DownLoader.53842
New Malware.u McAfee Trojan.DownLoader.5555
New Malware.u McAfee BackDoor.Pigeon.2141
New Malware.u McAfee BackDoor.Pigeon.1273
New Malware.u McAfee BackDoor.Pigeon.17
New Malware.u McAfee BackDoor.Pigeon.1823
New Malware.u McAfee Trojan.PWS.Imp
New Malware.u McAfee Trojan.DownLoader.57000
New Malware.u McAfee Trojan.DownLoader.61793
New Malware.u McAfee Trojan.MulDrop.4561
New Malware.u McAfee DDoS.Bonke.50
New Malware.u McAfee BackDoor.Gupt.25
New Malware.u McAfee Trojan.PWS.Banker.12840
New Malware.u McAfee Trojan.MulDrop.13064
New Malware.u McAfee Trojan.MulDrop.12151
New Malware.u McAfee BackDoor.Pigeon.212
New Malware.u McAfee Trojan.PWS.Qqpass.397
New Malware.u McAfee BackDoor.Generic.1347
New Malware.u McAfee Trojan.PWS.Tibia
New Malware.u McAfee Trojan.MulDrop.14116
New Malware.u McAfee Trojan.Proxy.756
New Malware.u McAfee BackDoor.Pigeon.12203
New Malware.u McAfee Trojan.MulDrop.12980
New Malware.u McAfee Trojan.MulDrop.4247
New Malware.u McAfee BackDoor.Pigeon.6974
New Malware.u McAfee BackDoor.Pigeon.1631
New Malware.u McAfee BackDoor.Pigeon.1647
New Malware.u McAfee BackDoor.Pigeon.1636
New Malware.u McAfee BackDoor.Pigeon.1645
New Malware.u McAfee BackDoor.Pigeon.1676
New Malware.u McAfee BackDoor.Pigeon.1671
New Malware.u McAfee BackDoor.Pigeon.1714
New Malware.u McAfee BackDoor.Pigeon.1669
New Malware.u McAfee BackDoor.Pigeon.1635
New Malware.u McAfee BackDoor.Pigeon.1657
New Malware.u McAfee BackDoor.Pigeon.1666
New Malware.u McAfee BackDoor.Pigeon.1644
New Malware.u McAfee Trojan.MulDrop.10119
New Malware.u McAfee Trojan.DownLoader.10781
New Malware.u McAfee Trojan.KeyLogger.1294
New Malware.u McAfee BackDoor.Alliance
New Malware.u McAfee Exploit.DCom.8
New Malware.u McAfee BackDoor.Pigeon.1047
New Malware.u McAfee BackDoor.Pigeon.1225

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.