Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.Spy.Goldun.NCN aliases:

Name Vendor Dr.Web classification name
Trojan.Spy.Goldun.NCN BitDefender Trojan.MulDrop.2112
Trojan.Spy.Goldun.NCN BitDefender Trojan.MulDrop.3494
Trojan.Spy.Goldun.NCN BitDefender Trojan.MulDrop.3360
Trojan.Spy.Goldun.NCN BitDefender Trojan.PWS.GoldSpy.2207
Trojan.Spy.Goldun.NCN BitDefender Trojan.MulDrop.18215
Trojan.Spy.Goldun.NCN BitDefender Trojan.MulDrop.4840
Trojan.Spy.Goldun.NCN BitDefender Trojan.MulDrop.17840
Trojan.Spy.Goldun.NCN BitDefender Trojan.PWS.Lineage.4690
Trojan.Spy.Goldun.NCN BitDefender Trojan.MulDrop.9000
Trojan.Spy.Goldun.NCN BitDefender Trojan.MulDrop.2758
Trojan.Spy.Goldun.NCN BitDefender Trojan.PWS.Egold
Trojan.Spy.Goldun.NCN BitDefender Trojan.PWS.GoldSpy
Trojan.Spy.Goldun.NCN BitDefender Trojan.PWS.Sentinel
Trojan.Spy.Goldun.NCN BitDefender Trojan.StartPage.867
Trojan.Spy.Goldun.NCN BitDefender BackDoor.Haxdoor.300
Trojan.Spy.Goldun.NCN BitDefender Trojan.MulDrop.14113
Trojan.Spy.Goldun.NCN BitDefender Trojan.MulDrop.4756
Trojan.Spy.Goldun.NCN BitDefender Trojan.MulDrop.4748
Trojan.Spy.Goldun.NCN BitDefender Trojan.MulDrop.5702
Trojan.Spy.Goldun.NCN BitDefender Trojan.MulDrop.3065
Trojan.Spy.Goldun.NCN BitDefender Trojan.PWS.Goldun
Trojan.Spy.Goldun.NCN BitDefender Trojan.MulDrop.7818
Trojan.Spy.Goldun.NCN BitDefender Trojan.MulDrop.16265
Trojan.Spy.Goldun.NCN BitDefender Trojan.MulDrop.8296
Trojan.Spy.Goldun.NCN BitDefender Trojan.MulDrop.3029
Trojan.Spy.Goldun.NCN BitDefender BackDoor.Haxdoor.318
Trojan.Spy.Goldun.NCN BitDefender Trojan.PWS.GoldSpy.2596
Trojan.Spy.Goldun.NCN BitDefender Trojan.PWS.GoldSpy.2608
Trojan.Spy.Goldun.NCN BitDefender Trojan.PWS.GoldSpy.2622
Trojan.Spy.Goldun.NCN BitDefender Trojan.PWS.Banker.27257
Trojan.Spy.Goldun.NCN BitDefender Trojan.PWS.GoldSpy.2595
Trojan.Spy.Goldun.NCN BitDefender Trojan.PWS.GoldSpy.2621
Trojan.Spy.Goldun.NCN BitDefender Trojan.PWS.GoldSpy.2607
Trojan.Spy.Goldun.NCN BitDefender Trojan.PWS.GoldSpy.2614
Trojan.Spy.Goldun.NCN BitDefender Trojan.PWS.GoldSpy.2652
Trojan.Spy.Goldun.NCN BitDefender Trojan.PWS.Banker.27557
Trojan.Spy.Goldun.NCN BitDefender Trojan.PWS.Banker.27617
Trojan.Spy.Goldun.NCN BitDefender Trojan.PWS.GoldSpy.2640
Trojan.Spy.Goldun.NCN BitDefender Trojan.PWS.GoldSpy.2656
Trojan.Spy.Goldun.NCN BitDefender Trojan.PWS.Banker.27679
Trojan.Spy.Goldun.NCN BitDefender Trojan.PWS.GoldSpy.2584
Trojan.Spy.Goldun.NCN BitDefender Trojan.PWS.GoldSpy.2560
Trojan.Spy.Goldun.NCN BitDefender Trojan.PWS.GoldSpy.2585
Trojan.Spy.Goldun.NCN BitDefender Trojan.NtRootKit.2684
Trojan.Spy.Goldun.NCN BitDefender Trojan.PWS.Banker.27618
Trojan.Spy.Goldun.NCN BitDefender Trojan.Siggen.1352
Trojan.Spy.Goldun.NCN BitDefender Trojan.PWS.Banker.739
Trojan.Spy.Goldun.NCN BitDefender Trojan.NtRootKit.2749
Trojan.Spy.Goldun.NCN BitDefender Trojan.NtRootKit.2750
Trojan.Spy.Goldun.NCN BitDefender Trojan.PWS.GoldSpy.2669

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.