Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

PWSteal.Trojan aliases:

Name Vendor Dr.Web classification name
PWSteal.Trojan Symantec BackDoor.Generic.627
PWSteal.Trojan Symantec BackDoor.Generic.850
PWSteal.Trojan Symantec BackDoor.Generic.144
PWSteal.Trojan Symantec Trojan.PWS.Aim.10
PWSteal.Trojan Symantec Trojan.PWS.Aimcook
PWSteal.Trojan Symantec BackDoor.AcidShiver
PWSteal.Trojan Symantec Trojan.PWS.Progenic
PWSteal.Trojan Symantec Trojan.ICQPager
PWSteal.Trojan Symantec Trojan.Cookie.25
PWSteal.Trojan Symantec Trojan.Agentl
PWSteal.Trojan Symantec Trojan.PWS.HotSteal
PWSteal.Trojan Symantec Trojan.PWS.Haptk
PWSteal.Trojan Symantec Trojan.Fakeyah
PWSteal.Trojan Symantec Trojan.PWS.Fakemsn.46
PWSteal.Trojan Symantec Trojan.PWS.MSNFake
PWSteal.Trojan Symantec Trojan.BotKill
PWSteal.Trojan Symantec Trojan.MulDrop.332
PWSteal.Trojan Symantec Adware.BargainBuddy
PWSteal.Trojan Symantec Trojan.Aim.10
PWSteal.Trojan Symantec Trojan.PWS.Brasil
PWSteal.Trojan Symantec Trojan.KeyLogger.43
PWSteal.Trojan Symantec BackDoor.Satan.10
PWSteal.Trojan Symantec Trojan.PWS.Signon
PWSteal.Trojan Symantec Trojan.PWS.Aimbust
PWSteal.Trojan Symantec Trojan.PWS.Strangix
PWSteal.Trojan Symantec Trojan.Aim.30
PWSteal.Trojan Symantec Trojan.KeyLogger.70
PWSteal.Trojan Symantec BackDoor.xBkDr.212
PWSteal.Trojan Symantec BackDoor.Xerver
PWSteal.Trojan Symantec BackDoor.Generic.856
PWSteal.Trojan Symantec BackDoor.Servant
PWSteal.Trojan Symantec BackDoor.Generic.312
PWSteal.Trojan Symantec BackDoor.Shilf
PWSteal.Trojan Symantec BackDoor.Generic.672
PWSteal.Trojan Symantec BackDoor.Ptsnoop
PWSteal.Trojan Symantec BackDoor.Generic.211
PWSteal.Trojan Symantec BackDoor.Explorer.10
PWSteal.Trojan Symantec BackDoor.Generic.172
PWSteal.Trojan Symantec BackDoor.Generic.171
PWSteal.Trojan Symantec BackDoor.Generic.170
PWSteal.Trojan Symantec BackDoor.CrazyNet.37
PWSteal.Trojan Symantec BackDoor.Generic.378
PWSteal.Trojan Symantec Trojan.PWS.Aolbill
PWSteal.Trojan Symantec FDOS.Acclock
PWSteal.Trojan Symantec Win32.HLLW.Acebot.4
PWSteal.Trojan Symantec Win32.HLLW.Leox
PWSteal.Trojan Symantec Trojan.Sprocit
PWSteal.Trojan Symantec Trojan.PWS.TheSpy
PWSteal.Trojan Symantec BackDoor.Generic.1169
PWSteal.Trojan Symantec Trojan.KeyLogger.142

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.