Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

PWSteal.Trojan aliases:

Name Vendor Dr.Web classification name
PWSteal.Trojan Symantec Trojan.Coutfo
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.352
PWSteal.Trojan Symantec BackDoor.Haxdoor.163
PWSteal.Trojan Symantec Trojan.KeyLogger.53
PWSteal.Trojan Symantec Trojan.KeyLogger.54
PWSteal.Trojan Symantec Trojan.KeyLogger.139
PWSteal.Trojan Symantec Trojan.KeyLogger.140
PWSteal.Trojan Symantec Trojan.KeyLogger.141
PWSteal.Trojan Symantec Trojan.Muhak
PWSteal.Trojan Symantec Trojan.KeySpy
PWSteal.Trojan Symantec Trojan.Fearless
PWSteal.Trojan Symantec Trojan.KeyLogger.78
PWSteal.Trojan Symantec Trojan.SpyMerries
PWSteal.Trojan Symantec Trojan.PWS.Chamadas
PWSteal.Trojan Symantec Trojan.PWS.Facil
PWSteal.Trojan Symantec Trojan.Edina
PWSteal.Trojan Symantec Trojan.PWS.Netslayer.10
PWSteal.Trojan Symantec Trojan.PWS.UserPass
PWSteal.Trojan Symantec Trojan.PWS.Aimbot
PWSteal.Trojan Symantec Trojan.PWS.Pinguim
PWSteal.Trojan Symantec Trojan.PWS.Pwlogger
PWSteal.Trojan Symantec Trojan.PWS.Bancos.97
PWSteal.Trojan Symantec Trojan.PWS.Banker.597
PWSteal.Trojan Symantec Trojan.KeyLogger.225
PWSteal.Trojan Symantec Trojan.MulDrop.1800
PWSteal.Trojan Symantec Trojan.GottySpy
PWSteal.Trojan Symantec Trojan.Click.155
PWSteal.Trojan Symantec Trojan.PWS.Stealer
PWSteal.Trojan Symantec Trojan.PWS.Zombie.1
PWSteal.Trojan Symantec Trojan.Spoli
PWSteal.Trojan Symantec Trojan.PWS.Recerv
PWSteal.Trojan Symantec Trojan.Mimail
PWSteal.Trojan Symantec Trojan.PWS.Zombie.20
PWSteal.Trojan Symantec Trojan.PWS.Faisal
PWSteal.Trojan Symantec Trojan.PWS.Tankist
PWSteal.Trojan Symantec Trojan.PWS.Zombie.10
PWSteal.Trojan Symantec Trojan.PWS.Zombie.12
PWSteal.Trojan Symantec Trojan.PWS.Diskert
PWSteal.Trojan Symantec Trojan.AimCanbot
PWSteal.Trojan Symantec Trojan.PWS.Shartek
PWSteal.Trojan Symantec BackDoor.Generic.948
PWSteal.Trojan Symantec Trojan.PWS.Sysedl
PWSteal.Trojan Symantec Trojan.PWS.Unite
PWSteal.Trojan Symantec Trojan.PWS.QQSender
PWSteal.Trojan Symantec Trojan.PWS.Raven.20
PWSteal.Trojan Symantec Trojan.PWS.RedZone.6501
PWSteal.Trojan Symantec BackDoor.Busi
PWSteal.Trojan Symantec Trojan.PWS.Shaman
PWSteal.Trojan Symantec Trojan.PWS.Laperle
PWSteal.Trojan Symantec Trojan.PWS.FakeFleet

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.