Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Ransom!bm aliases:

Name Vendor Dr.Web classification name
Ransom!bm McAfee Trojan.Winlock.162
Ransom!bm McAfee Trojan.Winlock.105
Ransom!bm McAfee Trojan.Winlock.259
Ransom!bm McAfee Trojan.Blackmailer.origin
Ransom!bm McAfee Trojan.Winlock.215
Ransom!bm McAfee Trojan.Blackmailer.1338
Ransom!bm McAfee Trojan.Encoder.38
Ransom!bm McAfee Trojan.Winlock.316
Ransom!bm McAfee Trojan.Blackmailer.1287
Ransom!bm McAfee Trojan.Winlock.68
Ransom!bm McAfee Trojan.MulDrop.35565
Ransom!bm McAfee Trojan.Winlock.164
Ransom!bm McAfee Trojan.Winlock.313
Ransom!bm McAfee Trojan.Blackmailer.1463
Ransom!bm McAfee Trojan.Winlock.69
Ransom!bm McAfee Trojan.MulDrop.32390
Ransom!bm McAfee BackDoor.Bifrost
Ransom!bm McAfee Trojan.Winlock.146
Ransom!bm McAfee Trojan.MulDrop.30762
Ransom!bm McAfee Trojan.PWS.LDPinch.4308
Ransom!bm McAfee Trojan.Winlock.113
Ransom!bm McAfee Trojan.Winlock.185
Ransom!bm McAfee Trojan.Annoy.24
Ransom!bm McAfee Trojan.Fakealert.5398
Ransom!bm McAfee Trojan.BrowseBan.55
Ransom!bm McAfee Trojan.Blackmailer.1248
Ransom!bm McAfee Trojan.Fakealert.4096
Ransom!bm McAfee Trojan.Winlock.1139
Ransom!bm McAfee Trojan.Winlock.153
Ransom!bm McAfee Trojan.Blackmailer.968
Ransom!bm McAfee Trojan.Blackmailer.703
Ransom!bm McAfee Trojan.Blackmailer.1438
Ransom!bm McAfee Trojan.Winlock.1034
Ransom!bm McAfee Trojan.Winlock.1048
Ransom!bm McAfee Trojan.Blackmailer.866
Ransom!bm McAfee Trojan.Winlock.179
Ransom!bm McAfee Win32.HLLW.Lime.based.18
Ransom!bm McAfee Trojan.Winlock.337
Ransom!bm McAfee Trojan.Winlock.123
Ransom!bm McAfee Trojan.Fakealert.8759
Ransom!bm McAfee Trojan.Fakealert.5766
Ransom!bm McAfee Trojan.Fakealert.5659

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.