Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

New Malware.u aliases:

Name Vendor Dr.Web classification name
New Malware.u McAfee BackDoor.Pigeon.3591
New Malware.u McAfee BackDoor.Pigeon.1599
New Malware.u McAfee BackDoor.Pigeon.11727
New Malware.u McAfee BackDoor.Pigeon.1910
New Malware.u McAfee BackDoor.Pigeon.8437
New Malware.u McAfee BackDoor.Pigeon.6173
New Malware.u McAfee Trojan.DownLoader.59792
New Malware.u McAfee BackDoor.Beizhu.758
New Malware.u McAfee Trojan.PWS.Swz
New Malware.u McAfee Trojan.DownLoader.19072
New Malware.u McAfee Trojan.DownLoader.19073
New Malware.u McAfee Trojan.Proxy.1692
New Malware.u McAfee Trojan.DownLoader.19067
New Malware.u McAfee Trojan.Proxy.1691
New Malware.u McAfee Trojan.Proxy.1694
New Malware.u McAfee Trojan.Proxy.1695
New Malware.u McAfee Trojan.Proxy.1693
New Malware.u McAfee BackDoor.Beizhu.1016
New Malware.u McAfee BackDoor.Beizhu.1014
New Malware.u McAfee Trojan.Linkno
New Malware.u McAfee BackDoor.Pigeon.9027
New Malware.u McAfee Trojan.Techkill
New Malware.u McAfee Trojan.Click.17574
New Malware.u McAfee BackDoor.Huai.2805
New Malware.u McAfee Trojan.Sniff.92
New Malware.u McAfee BackDoor.Pigeon.12202
New Malware.u McAfee BackDoor.Pigeon.13349
New Malware.u McAfee BackDoor.Pigeon.8021
New Malware.u McAfee Win32.HLLW.Autoruner.2175
New Malware.u McAfee Trojan.PWS.Banker.16668
New Malware.u McAfee Win32.HLLW.Autoruner.2145
New Malware.u McAfee Trojan.PWS.Capi
New Malware.u McAfee BackDoor.IRC.Sdbot.804
New Malware.u McAfee Trojan.Jay
New Malware.u McAfee BackDoor.BlackHole.2075
New Malware.u McAfee Trojan.MulDrop.2996
New Malware.u McAfee BackDoor.ProRat.19
New Malware.u McAfee Trojan.MulDrop.3072
New Malware.u McAfee Trojan.PWS.Lineage.3499
New Malware.u McAfee Trojan.PWS.Banker.3802
New Malware.u McAfee Trojan.Peflog.30
New Malware.u McAfee Trojan.PWS.Lineage.3496
New Malware.u McAfee Trojan.PWS.Lineage.3501
New Malware.u McAfee Trojan.PWS.Lineage.3500
New Malware.u McAfee Trojan.PWS.Lineage.3503
New Malware.u McAfee BackDoor.Pigeon.8295
New Malware.u McAfee BackDoor.Pigeon.200
New Malware.u McAfee Trojan.DownLoader.57138
New Malware.u McAfee Trojan.MulDrop.16406
New Malware.u McAfee BackDoor.Pigeon.8997

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.