Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

W32/Sdbot.worm aliases:

Name Vendor Dr.Web classification name
W32/Sdbot.worm McAfee BackDoor.Chimera
W32/Sdbot.worm McAfee Trojan.MulDrop.5820
W32/Sdbot.worm McAfee BackDoor.Poison
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1221
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1223
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1099
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.703
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.715
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.718
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.3120
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.3121
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.3124
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.3117
W32/Sdbot.worm McAfee Trojan.PWS.Legmir.1256
W32/Sdbot.worm McAfee Trojan.DownLoader.59583
W32/Sdbot.worm McAfee BackDoor.IRC.Torsion
W32/Sdbot.worm McAfee BackDoor.Iroffer.1323
W32/Sdbot.worm McAfee BackDoor.IRC.Gurr
W32/Sdbot.worm McAfee Exploit.MS07-033
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1203
W32/Sdbot.worm McAfee Win32.HLLM.Limar
W32/Sdbot.worm McAfee BackDoor.Pigeon.1622
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1346
W32/Sdbot.worm McAfee BackDoor.IRC.Rifle
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1269
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1062
W32/Sdbot.worm McAfee Trojan.DownLoader.35885
W32/Sdbot.worm McAfee BackDoor.Pigeon.19150
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1273
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1222
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1658
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1022
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1831
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1764
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1763
W32/Sdbot.worm McAfee BackDoor.IRC.Irini
W32/Sdbot.worm McAfee BackDoor.IRC.Koniec
W32/Sdbot.worm McAfee Trojan.Packed.166
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1430
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1509
W32/Sdbot.worm McAfee Win32.HLLW.Autoruner.5544
W32/Sdbot.worm McAfee Program.KgbSpy
W32/Sdbot.worm McAfee Win32.HLLW.MyBot.188
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.2055
W32/Sdbot.worm McAfee Trojan.MulDrop.8800
W32/Sdbot.worm McAfee Trojan.MulDrop.8943
W32/Sdbot.worm McAfee Trojan.Elispy
W32/Sdbot.worm McAfee Trojan.PWS.Panda.20
W32/Sdbot.worm McAfee Trojan.MulDrop.8318
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.2019

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.