Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

New Malware.u aliases:

Name Vendor Dr.Web classification name
New Malware.u McAfee Win32.HLLW.Medbod
New Malware.u McAfee Trojan.DownLoader.18061
New Malware.u McAfee BackDoor.Pigeon.960
New Malware.u McAfee Trojan.DownLoader.18100
New Malware.u McAfee Trojan.PWS.Banker.6666
New Malware.u McAfee Trojan.PWS.Banker.6656
New Malware.u McAfee BackDoor.Urlen
New Malware.u McAfee Trojan.DownLoader.18304
New Malware.u McAfee Trojan.PWS.Egspy
New Malware.u McAfee Trojan.DownLoader.18423
New Malware.u McAfee Trojan.DownLoader.4461
New Malware.u McAfee Trojan.PWS.Qqpass.192
New Malware.u McAfee BackDoor.Pigeon.1212
New Malware.u McAfee BackDoor.Pigeon.1247
New Malware.u McAfee BackDoor.Kais
New Malware.u McAfee BackDoor.Pigeon.1268
New Malware.u McAfee BackDoor.Pigeon.1269
New Malware.u McAfee Trojan.DownLoader.19223
New Malware.u McAfee BackDoor.Pigeon.1280
New Malware.u McAfee Trojan.DownLoader.19195
New Malware.u McAfee BackDoor.Generic.1552
New Malware.u McAfee VirusConstructor.Shell
New Malware.u McAfee BackDoor.Pigeon.1556
New Malware.u McAfee BackDoor.Swz
New Malware.u McAfee BackDoor.Ekai
New Malware.u McAfee BackDoor.Pigeon.225
New Malware.u McAfee BackDoor.Pigeon.1581
New Malware.u McAfee Trojan.Freed
New Malware.u McAfee BackDoor.Pigeon.805
New Malware.u McAfee Trojan.DownLoader.19939
New Malware.u McAfee Trojan.DownLoader.19913
New Malware.u McAfee Tool.Webshell
New Malware.u McAfee BackDoor.Pigeon.1604
New Malware.u McAfee Trojan.DownLoader.20386
New Malware.u McAfee Trojan.MulDrop.5944
New Malware.u McAfee Trojan.DownLoader.20290
New Malware.u McAfee BackDoor.IRC.Sdbot.1298
New Malware.u McAfee Trojan.Guis
New Malware.u McAfee BackDoor.Svin
New Malware.u McAfee Trojan.MulDrop.2776
New Malware.u McAfee BackDoor.Pigeon.83
New Malware.u McAfee Trojan.PWS.Banker.8016
New Malware.u McAfee Trojan.Click.2103
New Malware.u McAfee Trojan.DownLoader.21724
New Malware.u McAfee Trojan.DownLoader.21672
New Malware.u McAfee Trojan.PWS.Banker.9221
New Malware.u McAfee Trojan.DownLoader.22295
New Malware.u McAfee BackDoor.Huai
New Malware.u McAfee BackDoor.IRC.Sdbot.3238
New Malware.u McAfee BackDoor.Pigeon.323

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.