Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

W32/Sdbot.worm aliases:

Name Vendor Dr.Web classification name
W32/Sdbot.worm McAfee Win32.HLLW.Randex
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.3
W32/Sdbot.worm McAfee BackDoor.IRC.Jbbot.21
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.263
W32/Sdbot.worm McAfee BackDoor.SurfBear
W32/Sdbot.worm McAfee Win32.HLLW.Jrbot
W32/Sdbot.worm McAfee BackDoor.IRC.Simplbot
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.5
W32/Sdbot.worm McAfee Flooder.Boxed
W32/Sdbot.worm McAfee Win32.HLLW.Shepher
W32/Sdbot.worm McAfee Win32.HLLW.Heher
W32/Sdbot.worm McAfee Trojan.Proxy.3335
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.224
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.7
W32/Sdbot.worm McAfee BackDoor.IRC.Doom
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.106
W32/Sdbot.worm McAfee BackDoor.IRC.Fearbot
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.4851
W32/Sdbot.worm McAfee Trojan.MulDrop.675
W32/Sdbot.worm McAfee Trojan.MulDrop.565
W32/Sdbot.worm McAfee BackDoor.Agobot
W32/Sdbot.worm McAfee BackDoor.IRC.Miami
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.based
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.464
W32/Sdbot.worm McAfee Trojan.DownLoader.37763
W32/Sdbot.worm McAfee BackDoor.Bifrost.11
W32/Sdbot.worm McAfee BackDoor.Bifrost
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.436
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.446
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.445
W32/Sdbot.worm McAfee Trojan.PWS.Lancard
W32/Sdbot.worm McAfee Win32.HLLW.Agobot
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.452
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.443
W32/Sdbot.worm McAfee Win32.HLLW.SpyBot
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.435
W32/Sdbot.worm McAfee BackDoor.IRC.Rxbot
W32/Sdbot.worm McAfee Trojan.DownLoader.5270
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.449
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.439
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.444
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.56
W32/Sdbot.worm McAfee Win32.IRC.Bot.based
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot
W32/Sdbot.worm McAfee Win32.HLLW.MyBot.based
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.442
W32/Sdbot.worm McAfee Win32.HLLW.MyBot
W32/Sdbot.worm McAfee Trojan.MulDrop.2054
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.450
W32/Sdbot.worm McAfee Win32.IRC.Bot

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.