Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan-Spy.Win32.Goldun aliases:

Name Vendor Dr.Web classification name
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.TheBat.1
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2592
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2595
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2597
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.Clb.46
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2620
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2603
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2604
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2599
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2615
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2616
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.Clb.43
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.Clb.45
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.Clb.42
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2580
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2571
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2575
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2561
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2255
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2267
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2277
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2272
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2390
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2708
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.Corpse
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2162
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2163
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.Corpse.7
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2165
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2169
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2198
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2185
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2207
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2182
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2188
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.Corpse.8
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2552
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2231
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2208
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2229
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2278
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2391
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2149
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2266
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.2227
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.3195
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.3218
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.3150
Trojan-Spy.Win32.Goldun VirusBlokAda Trojan.PWS.GoldSpy.3206

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.