Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

PWSteal.Trojan aliases:

Name Vendor Dr.Web classification name
PWSteal.Trojan Symantec Trojan.MulDrop.2112
PWSteal.Trojan Symantec Trojan.StartPage.867
PWSteal.Trojan Symantec Trojan.SpyScreen
PWSteal.Trojan Symantec Trojan.DownLoader.1372
PWSteal.Trojan Symantec Trojan.DownLoader.2037
PWSteal.Trojan Symantec Trojan.PWS.Wilba
PWSteal.Trojan Symantec Trojan.TeensMail
PWSteal.Trojan Symantec Adware.123mania
PWSteal.Trojan Symantec Trojan.PWS.Detei
PWSteal.Trojan Symantec Trojan.PWS.Rist.20
PWSteal.Trojan Symantec Trojan.PWS.Andriq
PWSteal.Trojan Symantec Trojan.PWS.Legend
PWSteal.Trojan Symantec Trojan.Justone
PWSteal.Trojan Symantec Trojan.PWS.Acemast
PWSteal.Trojan Symantec Trojan.PWS.Yardim
PWSteal.Trojan Symantec Trojan.PWS.CybDemon
PWSteal.Trojan Symantec Trojan.PWS.Pentas
PWSteal.Trojan Symantec Trojan.PWS.Vedul
PWSteal.Trojan Symantec Trojan.Wmpatch
PWSteal.Trojan Symantec BackDoor.DeepThroat
PWSteal.Trojan Symantec Trojan.PWS.Iceman
PWSteal.Trojan Symantec Trojan.Apop
PWSteal.Trojan Symantec Trojan.Fakeaim
PWSteal.Trojan Symantec Trojan.PWS.Abot
PWSteal.Trojan Symantec Trojan.PWS.Ripper.23
PWSteal.Trojan Symantec Trojan.PWS.Ripper.24
PWSteal.Trojan Symantec Trojan.ProAgent.12
PWSteal.Trojan Symantec Trojan.Aimtor.101
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.396
PWSteal.Trojan Symantec Trojan.MulDrop.2741
PWSteal.Trojan Symantec Trojan.MulDrop.1120
PWSteal.Trojan Symantec Trojan.Tempoz
PWSteal.Trojan Symantec Trojan.PWS.M2.16
PWSteal.Trojan Symantec Trojan.Hooker.5632
PWSteal.Trojan Symantec Trojan.PWS.Zich
PWSteal.Trojan Symantec BackDoor.Y3krat.16
PWSteal.Trojan Symantec BackDoor.XLog.22
PWSteal.Trojan Symantec BackDoor.Generic.967
PWSteal.Trojan Symantec BackDoor.Netian
PWSteal.Trojan Symantec Trojan.PWS.Trillian.10
PWSteal.Trojan Symantec BackDoor.Teenbot
PWSteal.Trojan Symantec BackDoor.Fiend.4096
PWSteal.Trojan Symantec BackDoor.Radmin.4
PWSteal.Trojan Symantec BackDoor.Progenic.10
PWSteal.Trojan Symantec Trojan.KeyLogger.181
PWSteal.Trojan Symantec BackDoor.Madshi
PWSteal.Trojan Symantec BackDoor.Seed.11
PWSteal.Trojan Symantec Trojan.PWS.Netcfg
PWSteal.Trojan Symantec BackDoor.Crat
PWSteal.Trojan Symantec BackDoor.GWGirl.272

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.