Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

W32/Sdbot.worm aliases:

Name Vendor Dr.Web classification name
W32/Sdbot.worm McAfee BackDoor.IRC.Bot
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.429
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.432
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.466
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.468
W32/Sdbot.worm McAfee BackDoor.IRC.Phantom
W32/Sdbot.worm McAfee Trojan.PWS.Qqrobber.31
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.474
W32/Sdbot.worm McAfee Win32.HLLW.SpyBot.49
W32/Sdbot.worm McAfee Trojan.PWS.Banker.1552
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.488
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.485
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.487
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.484
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.500
W32/Sdbot.worm McAfee BackDoor.Oscar
W32/Sdbot.worm McAfee Win32.Detox
W32/Sdbot.worm McAfee Win32.HLLW.Anav.43530
W32/Sdbot.worm McAfee BackDoor.Xarom
W32/Sdbot.worm McAfee Trojan.Click.1031
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.527
W32/Sdbot.worm McAfee Trojan.Click.1033
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.530
W32/Sdbot.worm McAfee BackDoor.Prosti
W32/Sdbot.worm McAfee BackDoor.IRC.Skynet.12
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.535
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.539
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.538
W32/Sdbot.worm McAfee Win32.HLLW.SpyBot.66
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.541
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.545
W32/Sdbot.worm McAfee Trojan.PWS.Banker.2523
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.548
W32/Sdbot.worm McAfee BackDoor.Optix.13
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.496
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.455
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.132
W32/Sdbot.worm McAfee Trojan.DownLoader.4293
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.482
W32/Sdbot.worm McAfee BackDoor.DarkMoon.66
W32/Sdbot.worm McAfee Trojan.DownLoader.6426
W32/Sdbot.worm McAfee Trojan.NtRootKit.40
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.456
W32/Sdbot.worm McAfee BackDoor.Rtkit.12
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.523
W32/Sdbot.worm McAfee Trojan.Morav
W32/Sdbot.worm McAfee BackDoor.Chen
W32/Sdbot.worm McAfee Win32.HLLW.Shodan.7
W32/Sdbot.worm McAfee Trojan.Iespy
W32/Sdbot.worm McAfee BackDoor.IRC.Wisdom

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.