The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
A family of trojan programs called droppers, whose purpose is to deliver the payload hidden inside them to the target system. Depending on the attackers’ needs, the dropper trojans are capable of spreading various types of threats, including other malware, unwanted software and adware.
Trojan.MulDrop.18.origin
Trojan.MulDrop.18974
Trojan.MulDrop.18990
Trojan.MulDrop.18991
Trojan.MulDrop.18999
Trojan.MulDrop.19010
Trojan.MulDrop.19012
Trojan.MulDrop.19069
Trojan.MulDrop.19072
Trojan.MulDrop.19130
Trojan.MulDrop.19133
Trojan.MulDrop.19171
Trojan.MulDrop.19183
Trojan.MulDrop.19195
Trojan.MulDrop.19198
Trojan.MulDrop.19212
Trojan.MulDrop.19246
Trojan.MulDrop.19299
Trojan.MulDrop.19329
Trojan.MulDrop.19395
Trojan.MulDrop.19490
Trojan.MulDrop.19491
Trojan.MulDrop.19498
Trojan.MulDrop.19518
Trojan.MulDrop.19519
Trojan.MulDrop.19524
Trojan.MulDrop.19526
Trojan.MulDrop.19527
Trojan.MulDrop.19545
Trojan.MulDrop.19557
Trojan.MulDrop.19627
Trojan.MulDrop.19634
Trojan.MulDrop.19645
Trojan.MulDrop.19646
Trojan.MulDrop.19655
Trojan.MulDrop.19709
Trojan.MulDrop.19716
Trojan.MulDrop.19784
Trojan.MulDrop.19791
Trojan.MulDrop.19885
Trojan.MulDrop.19914
Trojan.MulDrop.19950
Trojan.MulDrop.19969
Trojan.MulDrop.19998
Trojan.MulDrop.20002
Trojan.MulDrop.20028
Trojan.MulDrop.20083
Trojan.MulDrop.20098
Trojan.MulDrop.20108
Trojan.MulDrop.20118
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.