Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

PWSteal.Trojan aliases:

Name Vendor Dr.Web classification name
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.271
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.270
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.261
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.322
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.269
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.258
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.245
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.235
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.158
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.156
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.205
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.203
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.214
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.106
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.145
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.137
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.101
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.134
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.136
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.234
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.159
PWSteal.Trojan Symantec Trojan.PWS.Banker.1374
PWSteal.Trojan Symantec Trojan.MulDrop.30
PWSteal.Trojan Symantec Trojan.PWS.Qqrobber
PWSteal.Trojan Symantec Trojan.AVKill.135
PWSteal.Trojan Symantec BackDoor.Generic.1263
PWSteal.Trojan Symantec Trojan.PWS.Qqpass.37
PWSteal.Trojan Symantec Trojan.KeyLogger.353
PWSteal.Trojan Symantec Trojan.PWS.Qqgame
PWSteal.Trojan Symantec Trojan.SpyRadar
PWSteal.Trojan Symantec Trojan.PWS.Dow
PWSteal.Trojan Symantec Trojan.PWS.Webmonier
PWSteal.Trojan Symantec Trojan.KeyLogger.308
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.573
PWSteal.Trojan Symantec Trojan.Inject.27
PWSteal.Trojan Symantec Trojan.MulDrop.2933
PWSteal.Trojan Symantec Win32.HLLM.Generic.376
PWSteal.Trojan Symantec Trojan.PWS.Fox
PWSteal.Trojan Symantec BackDoor.Generic.880
PWSteal.Trojan Symantec Trojan.Renat
PWSteal.Trojan Symantec Trojan.PWS.Coced.229
PWSteal.Trojan Symantec Trojan.PWS.Qqrobber.39
PWSteal.Trojan Symantec Trojan.PWS.Tencent
PWSteal.Trojan Symantec Trojan.PWS.Qqrobber.36
PWSteal.Trojan Symantec Trojan.PWS.Ravmon
PWSteal.Trojan Symantec Trojan.PWS.Jamie
PWSteal.Trojan Symantec Trojan.PWS.Kukel
PWSteal.Trojan Symantec BackDoor.Generic.933
PWSteal.Trojan Symantec Trojan.PWS.Zyxea
PWSteal.Trojan Symantec Win32.WMSpy.2291

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.