Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

PWSteal.Trojan aliases:

Name Vendor Dr.Web classification name
PWSteal.Trojan Symantec Trojan.PWS.Valdis
PWSteal.Trojan Symantec Trojan.PWS.Banker.314
PWSteal.Trojan Symantec BackDoor.BlueFire.1
PWSteal.Trojan Symantec BackDoor.BlackAngel.5
PWSteal.Trojan Symantec Trojan.MulDrop.1797
PWSteal.Trojan Symantec Trojan.MulDrop.1753
PWSteal.Trojan Symantec Trojan.MulDrop.1537
PWSteal.Trojan Symantec Trojan.MulDrop.2799
PWSteal.Trojan Symantec Trojan.PWS.Banking
PWSteal.Trojan Symantec BackDoor.Generic.681
PWSteal.Trojan Symantec Trojan.PWS.Mob
PWSteal.Trojan Symantec Trojan.PWS.LWteam
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.224
PWSteal.Trojan Symantec Trojan.UrbanSpy
PWSteal.Trojan Symantec Trojan.PWS.Fakeup
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.402
PWSteal.Trojan Symantec Trojan.PWS.Banker.479
PWSteal.Trojan Symantec Trojan.PWS.LDPinch.226
PWSteal.Trojan Symantec Trojan.DownLoader.2979
PWSteal.Trojan Symantec LDPinch.Generator
PWSteal.Trojan Symantec Trojan.DownLoader.3458
PWSteal.Trojan Symantec Trojan.PWS.Sar
PWSteal.Trojan Symantec Win32.HLLW.Shorm.15
PWSteal.Trojan Symantec Win32.HLLW.Shorm.16
PWSteal.Trojan Symantec Win32.HLLW.Shorm.17
PWSteal.Trojan Symantec BackDoor.Agobot
PWSteal.Trojan Symantec Trojan.PWS.Malog
PWSteal.Trojan Symantec Trojan.PWS.Gop.101
PWSteal.Trojan Symantec Trojan.SilentLog
PWSteal.Trojan Symantec Trojan.Winsy
PWSteal.Trojan Symantec Trojan.MulDrop.1037
PWSteal.Trojan Symantec Trojan.Uploader
PWSteal.Trojan Symantec Trojan.PWS.Widget.61
PWSteal.Trojan Symantec Trojan.PWS.Widget.64
PWSteal.Trojan Symantec Trojan.PWS.Widget.52
PWSteal.Trojan Symantec Trojan.Wmpatch.40960
PWSteal.Trojan Symantec Trojan.Vovan
PWSteal.Trojan Symantec Trojan.PWS.Vovan
PWSteal.Trojan Symantec BackDoor.Pointex
PWSteal.Trojan Symantec BackDoor.Generic.694
PWSteal.Trojan Symantec Trojan.PWS.Outlooker
PWSteal.Trojan Symantec Trojan.Thief
PWSteal.Trojan Symantec Trojan.PWS.Tapibot
PWSteal.Trojan Symantec Trojan.Spylog
PWSteal.Trojan Symantec Trojan.PWS.Statist
PWSteal.Trojan Symantec Trojan.StartPage.684
PWSteal.Trojan Symantec Trojan.PWS.Bancos.185
PWSteal.Trojan Symantec BackDoor.Generic.575
PWSteal.Trojan Symantec Trojan.KeyLogger.55
PWSteal.Trojan Symantec Trojan.KeyLogger.138

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.