Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_Generic.SFB aliases:

Name Vendor Dr.Web classification name
TROJ_Generic.SFB Trend Micro Trojan.Popuper.7294
TROJ_Generic.SFB Trend Micro Trojan.Popuper.6992
TROJ_Generic.SFB Trend Micro Trojan.PWS.Banker.12446
TROJ_Generic.SFB Trend Micro BackDoor.Bifrost.788
TROJ_Generic.SFB Trend Micro BackDoor.Winsck
TROJ_Generic.SFB Trend Micro BackDoor.Bifrost.491
TROJ_Generic.SFB Trend Micro Trojan.YahooSpy.8
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.43021
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.43407
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.43115
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.42925
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.43351
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.43202
TROJ_Generic.SFB Trend Micro Adware.Dodoor.123
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.42917
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.43083
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.43032
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.43198
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.42791
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.42997
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.43128
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.42945
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.43138
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.43179
TROJ_Generic.SFB Trend Micro BackDoor.Pigeon.9167
TROJ_Generic.SFB Trend Micro BackDoor.Pigeon.12989
TROJ_Generic.SFB Trend Micro Trojan.MulDrop.10115
TROJ_Generic.SFB Trend Micro Adware.Bho.2964
TROJ_Generic.SFB Trend Micro Adware.Cinmus.14158
TROJ_Generic.SFB Trend Micro Adware.Bho.3078
TROJ_Generic.SFB Trend Micro Adware.Mokead.299
TROJ_Generic.SFB Trend Micro Adware.Siggen.2720
TROJ_Generic.SFB Trend Micro Adware.Siggen.2667
TROJ_Generic.SFB Trend Micro Adware.Siggen.2772
TROJ_Generic.SFB Trend Micro Adware.Siggen.2848
TROJ_Generic.SFB Trend Micro Adware.Siggen.2733
TROJ_Generic.SFB Trend Micro Adware.Siggen.2761
TROJ_Generic.SFB Trend Micro Adware.Siggen.2602
TROJ_Generic.SFB Trend Micro Adware.Mokead.329
TROJ_Generic.SFB Trend Micro Adware.Siggen.2796
TROJ_Generic.SFB Trend Micro Adware.Mokead.278
TROJ_Generic.SFB Trend Micro Adware.Siggen.2704
TROJ_Generic.SFB Trend Micro Adware.Siggen.2622
TROJ_Generic.SFB Trend Micro Adware.Siggen.2605
TROJ_Generic.SFB Trend Micro Adware.Siggen.2716
TROJ_Generic.SFB Trend Micro Adware.Siggen.2834
TROJ_Generic.SFB Trend Micro Adware.Siggen.2666
TROJ_Generic.SFB Trend Micro Adware.Siggen.2827
TROJ_Generic.SFB Trend Micro Adware.Siggen.2717
TROJ_Generic.SFB Trend Micro Adware.Mokead.341

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.