Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

PWSteal.Trojan aliases:

Name Vendor Dr.Web classification name
PWSteal.Trojan Symantec Trojan.PWS.Atar
PWSteal.Trojan Symantec Trojan.PWS.Alavar
PWSteal.Trojan Symantec Trojan.PWS.MagicPs.141
PWSteal.Trojan Symantec Trojan.PM
PWSteal.Trojan Symantec Trojan.Proxy.356
PWSteal.Trojan Symantec Trojan.PWS.NetMail.12
PWSteal.Trojan Symantec Trojan.PWS.M2.147
PWSteal.Trojan Symantec Trojan.PWS.Hotix
PWSteal.Trojan Symantec Trojan.PWS.Hidep
PWSteal.Trojan Symantec Trojan.Fahoil
PWSteal.Trojan Symantec Trojan.PWS.FakeIcq
PWSteal.Trojan Symantec Trojan.PWS.FakeIrc
PWSteal.Trojan Symantec Trojan.PWS.Fakeyah
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.189
PWSteal.Trojan Symantec Trojan.MulDrop.1705
PWSteal.Trojan Symantec BackDoor.IRC.Sdbot
PWSteal.Trojan Symantec Trojan.Neod
PWSteal.Trojan Symantec Trojan.PWS.Agu
PWSteal.Trojan Symantec BackDoor.Plunix
PWSteal.Trojan Symantec Trojan.StartPage.47
PWSteal.Trojan Symantec Trojan.Powerprof
PWSteal.Trojan Symantec Trojan.DownLoader.2961
PWSteal.Trojan Symantec Trojan.DownLoader.416
PWSteal.Trojan Symantec Trojan.PWS.Banker.1186
PWSteal.Trojan Symantec Trojan.Rasjorge
PWSteal.Trojan Symantec Trojan.PWS.Mespas.11
PWSteal.Trojan Symantec Mespas.Generator
PWSteal.Trojan Symantec Trojan.PWS.Kol
PWSteal.Trojan Symantec Trojan.PWS.AIMPass.5
PWSteal.Trojan Symantec Trojan.PWS.AntiLame.11
PWSteal.Trojan Symantec FDOS.Medusa
PWSteal.Trojan Symantec Trojan.MulDrop.801
PWSteal.Trojan Symantec Trojan.KeyLogger.83
PWSteal.Trojan Symantec Adware.NavHelper
PWSteal.Trojan Symantec BackDoor.Evade.13
PWSteal.Trojan Symantec BackDoor.Generic.589
PWSteal.Trojan Symantec BackDoor.Vatosajan
PWSteal.Trojan Symantec BackDoor.Undetected.23
PWSteal.Trojan Symantec BackDoor.SubSeven.21
PWSteal.Trojan Symantec BackDoor.Generic.770
PWSteal.Trojan Symantec Trojan.MulDrop.2258
PWSteal.Trojan Symantec Trojan.MulDrop.2259
PWSteal.Trojan Symantec BackDoor.Radmin.23
PWSteal.Trojan Symantec BackDoor.Icd
PWSteal.Trojan Symantec BackDoor.Fulame.25
PWSteal.Trojan Symantec BackDoor.Exploiter.13
PWSteal.Trojan Symantec BackDoor.Ehks.20
PWSteal.Trojan Symantec Trojan.PWS.Narod
PWSteal.Trojan Symantec Trojan.KeyLogger.129
PWSteal.Trojan Symantec BackDoor.Diplog

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.