Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

PWSteal.Trojan aliases:

Name Vendor Dr.Web classification name
PWSteal.Trojan Symantec BackDoor.Uragan
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.113
PWSteal.Trojan Symantec Trojan.PWS.Qqmail
PWSteal.Trojan Symantec Trojan.MulDrop.2764
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.165
PWSteal.Trojan Symantec BackDoor.DMoon
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.580
PWSteal.Trojan Symantec Trojan.MulDrop.3134
PWSteal.Trojan Symantec Trojan.Hookey
PWSteal.Trojan Symantec Trojan.PWS.LDPinch
PWSteal.Trojan Symantec BackDoor.PowerSpider
PWSteal.Trojan Symantec BackDoor.Winterlove
PWSteal.Trojan Symantec Trojan.MulDrop.2687
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.491
PWSteal.Trojan Symantec Dialer.Child
PWSteal.Trojan Symantec Trojan.DownLoader.1998
PWSteal.Trojan Symantec Trojan.Proxy.666
PWSteal.Trojan Symantec Trojan.Hooker.49
PWSteal.Trojan Symantec Trojan.MulDrop.3215
PWSteal.Trojan Symantec BackDoor.Generic.1158
PWSteal.Trojan Symantec Trojan.PWS.Qqrobber.27
PWSteal.Trojan Symantec Trojan.Whbot
PWSteal.Trojan Symantec Trojan.DownLoader.4840
PWSteal.Trojan Symantec Trojan.Click.824
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.406
PWSteal.Trojan Symantec Trojan.MulDrop.1465
PWSteal.Trojan Symantec BackDoor.Haxdoor.184
PWSteal.Trojan Symantec BackDoor.Igame
PWSteal.Trojan Symantec BackDoor.Netsnake
PWSteal.Trojan Symantec Trojan.KeyLogger.285
PWSteal.Trojan Symantec Trojan.MulDrop.2880
PWSteal.Trojan Symantec Trojan.PWS.Lineage
PWSteal.Trojan Symantec Trojan.PWS.Xinkey
PWSteal.Trojan Symantec BackDoor.Alliance
PWSteal.Trojan Symantec BackDoor.Haxdoor.176
PWSteal.Trojan Symantec BackDoor.Nuclearat.10
PWSteal.Trojan Symantec BackDoor.Hunter
PWSteal.Trojan Symantec BackDoor.Radmin.29
PWSteal.Trojan Symantec BackDoor.Nechto
PWSteal.Trojan Symantec BackDoor.Generic.1093
PWSteal.Trojan Symantec Exploit.Forcemail
PWSteal.Trojan Symantec Flooder.Godina
PWSteal.Trojan Symantec Trojan.DownLoader.2779
PWSteal.Trojan Symantec Trojan.PWS.Qqrobber.16
PWSteal.Trojan Symantec Trojan.MyRunner
PWSteal.Trojan Symantec BackDoor.AntiLame.21
PWSteal.Trojan Symantec Trojan.PWS.Mirka
PWSteal.Trojan Symantec Trojan.PWS.Wincap
PWSteal.Trojan Symantec Trojan.PWS.Fakebb
PWSteal.Trojan Symantec Trojan.PWS.Hangame

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.