Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TSPY_ZBOT.SMS aliases:

Name Vendor Dr.Web classification name
TSPY_ZBOT.SMS Trend Micro Trojan.PWS.Panda.113
TSPY_ZBOT.SMS Trend Micro Trojan.Packed.418
TSPY_ZBOT.SMS Trend Micro Trojan.Packed.475
TSPY_ZBOT.SMS Trend Micro Trojan.Proxy.6139
TSPY_ZBOT.SMS Trend Micro Trojan.PWS.Banker.27318
TSPY_ZBOT.SMS Trend Micro Trojan.Packed.139
TSPY_ZBOT.SMS Trend Micro Trojan.PWS.Panda.114
TSPY_ZBOT.SMS Trend Micro Trojan.PWS.Panda.31
TSPY_ZBOT.SMS Trend Micro Trojan.PWS.GoldSpy.2651
TSPY_ZBOT.SMS Trend Micro Trojan.PWS.Panda.117
TSPY_ZBOT.SMS Trend Micro Trojan.Inject.5408
TSPY_ZBOT.SMS Trend Micro Trojan.Packed.415
TSPY_ZBOT.SMS Trend Micro Trojan.PWS.Panda.110
TSPY_ZBOT.SMS Trend Micro Trojan.Proxy.13256
TSPY_ZBOT.SMS Trend Micro Trojan.Proxy.13258
TSPY_ZBOT.SMS Trend Micro Trojan.Proxy.13263
TSPY_ZBOT.SMS Trend Micro Trojan.Proxy.13257
TSPY_ZBOT.SMS Trend Micro Trojan.Packed.142
TSPY_ZBOT.SMS Trend Micro Trojan.PWS.Panda.107
TSPY_ZBOT.SMS Trend Micro Trojan.PWS.Panda.105
TSPY_ZBOT.SMS Trend Micro Trojan.Proxy.6361
TSPY_ZBOT.SMS Trend Micro Trojan.Proxy.6745
TSPY_ZBOT.SMS Trend Micro Trojan.Proxy.6372
TSPY_ZBOT.SMS Trend Micro Trojan.Proxy.6352
TSPY_ZBOT.SMS Trend Micro Trojan.Packed.194
TSPY_ZBOT.SMS Trend Micro Trojan.Proxy.8873
TSPY_ZBOT.SMS Trend Micro Trojan.Proxy.6441
TSPY_ZBOT.SMS Trend Micro Trojan.Proxy.6788
TSPY_ZBOT.SMS Trend Micro Trojan.Proxy.6449
TSPY_ZBOT.SMS Trend Micro Trojan.Proxy.6432
TSPY_ZBOT.SMS Trend Micro Trojan.Proxy.6828
TSPY_ZBOT.SMS Trend Micro Trojan.Proxy.6448
TSPY_ZBOT.SMS Trend Micro Trojan.Proxy.6504
TSPY_ZBOT.SMS Trend Micro Trojan.Proxy.11119
TSPY_ZBOT.SMS Trend Micro Trojan.Proxy.6500
TSPY_ZBOT.SMS Trend Micro Trojan.Proxy.6464
TSPY_ZBOT.SMS Trend Micro Trojan.Proxy.6488
TSPY_ZBOT.SMS Trend Micro Trojan.Proxy.6495
TSPY_ZBOT.SMS Trend Micro Trojan.Proxy.7165
TSPY_ZBOT.SMS Trend Micro Trojan.Proxy.6953
TSPY_ZBOT.SMS Trend Micro Trojan.Proxy.7270
TSPY_ZBOT.SMS Trend Micro Trojan.Proxy.6534
TSPY_ZBOT.SMS Trend Micro Trojan.Proxy.7074

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.