Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

PWSteal.Trojan aliases:

Name Vendor Dr.Web classification name
PWSteal.Trojan Symantec Trojan.MMTask.3
PWSteal.Trojan Symantec Trojan.PWS.Najort
PWSteal.Trojan Symantec Trojan.Moscow
PWSteal.Trojan Symantec Trojan.PWS.NetMail.20
PWSteal.Trojan Symantec BackDoor.Generic.401
PWSteal.Trojan Symantec Trojan.PWS.Mifeng
PWSteal.Trojan Symantec Trojan.PWS.MiniLD
PWSteal.Trojan Symantec BackDoor.Generic.483
PWSteal.Trojan Symantec Trojan.PWS.Legmir.256
PWSteal.Trojan Symantec BackDoor.Generic.1094
PWSteal.Trojan Symantec Win32.HLLM.Generic.372
PWSteal.Trojan Symantec Trojan.DownLoader.3331
PWSteal.Trojan Symantec Trojan.PWS.Legmir.25
PWSteal.Trojan Symantec Trojan.PWS.Legmir.359
PWSteal.Trojan Symantec Trojan.PWS.Legmir.370
PWSteal.Trojan Symantec Win32.HLLC.Relax
PWSteal.Trojan Symantec Trojan.Juwo
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.478
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.490
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.536
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.500
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.497
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.498
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.510
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.179
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.701
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.452
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.451
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.449
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.524
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.464
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.470
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.467
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.479
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.376
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.397
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.412
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.413
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.421
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.417
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.422
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.425
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.454
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.433
PWSteal.Trojan Symantec Trojan.MulDrop.2304
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.511
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.465
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.324
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.720
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.335

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.