The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
A family of trojan applications designed to increase website visits and generate income via online traffic. Depending on their version and modification, they perform various malicious actions. For example, when victims try to open websites, the malware can redirect them to other web addresses. They can also imitate user actions, automatically opening specific links and clicking on banners and other interactive site elements.
Trojan.Click
Trojan.Click.1000.origin
Trojan.Click.1004.origin
Trojan.Click.1007.origin
Trojan.Click.101.origin
Trojan.Click.1022.origin
Trojan.Click.1051.origin
Trojan.Click.1056.origin
Trojan.Click.1058.origin
Trojan.Click.1068.origin
Trojan.Click.18083
Trojan.Click.18901
Trojan.Click.18953
Trojan.Click.19112
Trojan.Click.19156
Trojan.Click.19713
Trojan.Click.19717
Trojan.Click.19769
Trojan.Click.19861
Trojan.Click.19896
Trojan.Click.19930
Trojan.Click.20017
Trojan.Click.20029
Trojan.Click.20059
Trojan.Click.20084
Trojan.Click.20147
Trojan.Click.20148
Trojan.Click.20169
Trojan.Click.20170
Trojan.Click.20182
Trojan.Click.20200
Trojan.Click.20246
Trojan.Click.20336
Trojan.Click.20338
Trojan.Click.20362
Trojan.Click.20552
Trojan.Click.20660
Trojan.Click.20661
Trojan.Click.21123
Trojan.Click.21133
Trojan.Click.21174
Trojan.Click.213.origin
Trojan.Click.21793
Trojan.Click.21801
Trojan.Click.22061
Trojan.Click.22128
Trojan.Click.22405
Trojan.Click.228.origin
Trojan.Click.23262
Trojan.Click.23266
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.