Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

PWSteal.Trojan aliases:

Name Vendor Dr.Web classification name
PWSteal.Trojan Symantec BackDoor.Vidro
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.387
PWSteal.Trojan Symantec Adware.SafeSearch
PWSteal.Trojan Symantec Trojan.StartPage.849
PWSteal.Trojan Symantec Tool.PassView
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.343
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.311
PWSteal.Trojan Symantec Trojan.MulDrop.343
PWSteal.Trojan Symantec Trojan.MulDrop.2662
PWSteal.Trojan Symantec Trojan.MulDrop.114
PWSteal.Trojan Symantec Trojan.MulDrop.876
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.319
PWSteal.Trojan Symantec BackDoor.Tran
PWSteal.Trojan Symantec Trojan.MulDrop.2444
PWSteal.Trojan Symantec Trojan.MulDrop.2078
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.256
PWSteal.Trojan Symantec BackDoor.Winsta
PWSteal.Trojan Symantec Trojan.DownLoader.4590
PWSteal.Trojan Symantec Trojan.KeyLogger.367
PWSteal.Trojan Symantec Trojan.DownLoader.6181
PWSteal.Trojan Symantec Trojan.PurityAd
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.361
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.508
PWSteal.Trojan Symantec Trojan.MulDrop.1195
PWSteal.Trojan Symantec Trojan.PWS.Qqpass.35
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.420
PWSteal.Trojan Symantec Trojan.DownLoader.2524
PWSteal.Trojan Symantec Trojan.PWS.Banker.970
PWSteal.Trojan Symantec Trojan.Inert
PWSteal.Trojan Symantec Trojan.MulDrop.2649
PWSteal.Trojan Symantec Trojan.DownLoader.4142
PWSteal.Trojan Symantec Trojan.PWS.Selfba
PWSteal.Trojan Symantec Trojan.PWS.Cslam
PWSteal.Trojan Symantec BackDoor.Salidol
PWSteal.Trojan Symantec Trojan.PWS.Henk
PWSteal.Trojan Symantec Trojan.Barrio.50
PWSteal.Trojan Symantec Trojan.PWS.Belial
PWSteal.Trojan Symantec Trojan.PWS.Money
PWSteal.Trojan Symantec Trojan.Apsen
PWSteal.Trojan Symantec BackDoor.Generic.1006
PWSteal.Trojan Symantec Trojan.Aim
PWSteal.Trojan Symantec Trojan.Ajan
PWSteal.Trojan Symantec BackDoor.PSClient
PWSteal.Trojan Symantec Trojan.PswStor
PWSteal.Trojan Symantec Trojan.ProAgent.13
PWSteal.Trojan Symantec Trojan.PWS.Passview
PWSteal.Trojan Symantec Trojan.MulDrop.2391
PWSteal.Trojan Symantec Trojan.PWS.Nutlook
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.525
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.540

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.