The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
| Name | Vendor | Dr.Web classification name |
|---|---|---|
| TR/Dropper.Gen2 | Avira | Trojan.Hottrend |
| BackDoor-DKI.gen.cb | McAfee | Trojan.Hottrend |
| Trojan:Win32/Bamital.E | Microsoft | Trojan.Hottrend |
| Trojan.Win32.Agent.edco | Kaspersky | Trojan.Hottrend |
| Trojan.Win32.Inject.1 | VirusBlokAda | Trojan.Hottrend |
| Gen:Variant.Kates.2 | BitDefender | Trojan.Hottrend |
| Trojan.Win32.Bamital.G (v) | SunBelt | Trojan.Hottrend |
| TROJ_BLYAME.SMEP | Trend Micro | Trojan.Hottrend |
| BackDoor-DKI.gen.cj | McAfee | Trojan.Hottrend |
| TR/PWS.Kates.AE.11 | Avira | Trojan.Hottrend |
| Trojan.PWS.Kates.AE | BitDefender | Trojan.Hottrend |
| TROJ_DROP.SMFU | Trend Micro | Trojan.Hottrend |
Trojan.Hottrend.524
Trojan.Hottrend.529
Trojan.Hottrend.530
Trojan.Hottrend.531
Trojan.Hottrend.533
Trojan.Hottrend.534
Trojan.Hottrend.535
Trojan.Hottrend.537
Trojan.Hottrend.538
Trojan.Hottrend.539
Trojan.Hottrend.542
Trojan.Hottrend.543
Trojan.Hottrend.544
Trojan.Hottrend.545
Trojan.Hottrend.546
Trojan.Hottrend.548
Trojan.Hottrend.549
Trojan.Hottrend.551
Trojan.Hottrend.553
Trojan.Hottrend.556
Trojan.Hottrend.558
Trojan.Hottrend.559
Trojan.Hottrend.561
Trojan.Hottrend.562
Trojan.Hottrend.563
Trojan.Hottrend.565
Trojan.Hottrend.566
Trojan.Hottrend.568
Trojan.Hottrend.573
Trojan.Hottrend.574
Trojan.Hottrend.575
Trojan.Hottrend.576
Trojan.Hottrend.577
Trojan.Hottrend.587
Trojan.Hottrend.591
Trojan.Hottrend.593
Trojan.Hottrend.594
Trojan.Hottrend.596
Trojan.Hottrend.600
Trojan.Hottrend.608
Trojan.Hottrend.609
Trojan.Hottrend.617
Trojan.Hottrend.618
Trojan.Hottrend.627
Trojan.Hottrend.628
Trojan.Hottrend.629
Trojan.Hottrend.630
Trojan.Hottrend.631
Trojan.Hottrend.634
Trojan.Hottrend.635
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.