Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

W32/Sdbot.worm aliases:

Name Vendor Dr.Web classification name
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.2013
W32/Sdbot.worm McAfee Trojan.DownLoader.33993
W32/Sdbot.worm McAfee BackDoor.Rbot.15
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1851
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.2005
W32/Sdbot.worm McAfee Trojan.MulDrop.8301
W32/Sdbot.worm McAfee BackDoor.PifPaf
W32/Sdbot.worm McAfee BackDoor.Pablos
W32/Sdbot.worm McAfee Win32.HLLW.MyBot.183
W32/Sdbot.worm McAfee Win32.HLLW.MyBot.151
W32/Sdbot.worm McAfee Trojan.Fakealert.3866
W32/Sdbot.worm McAfee DDoS.City.2
W32/Sdbot.worm McAfee Trojan.Click.24073
W32/Sdbot.worm McAfee Adware.Soso
W32/Sdbot.worm McAfee Trojan.PWS.Qqpass.1472
W32/Sdbot.worm McAfee Win32.HLLW.MyBot.184
W32/Sdbot.worm McAfee BackDoor.Bifrost.1236
W32/Sdbot.worm McAfee BackDoor.Poison.701
W32/Sdbot.worm McAfee BackDoor.Dong
W32/Sdbot.worm McAfee BackDoor.PifPaf.21
W32/Sdbot.worm McAfee BackDoor.Pablos.89
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.4652
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.4638
W32/Sdbot.worm McAfee BackDoor.IRC.Tiny.57
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.4655
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.4622
W32/Sdbot.worm McAfee BackDoor.IRC.Unkbot.114
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.4631
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.4625
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.4647
W32/Sdbot.worm McAfee BackDoor.IRC.Unkbot.117
W32/Sdbot.worm McAfee BackDoor.IRC.Unkbot.116
W32/Sdbot.worm McAfee BackDoor.IRC.Unkbot.123
W32/Sdbot.worm McAfee BackDoor.IRC.Unkbot.113
W32/Sdbot.worm McAfee BackDoor.IRC.Unkbot.115
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.4624
W32/Sdbot.worm McAfee BackDoor.IRC.Ravo.11
W32/Sdbot.worm McAfee BackDoor.IRC.Unkbot.119
W32/Sdbot.worm McAfee BackDoor.IRC.Pico.6
W32/Sdbot.worm McAfee Trojan.PWS.Qqrobber.427
W32/Sdbot.worm McAfee Trojan.PWS.Qqrobber.430
W32/Sdbot.worm McAfee Trojan.PWS.Qqrobber.420
W32/Sdbot.worm McAfee Trojan.PWS.Qqrobber.428
W32/Sdbot.worm McAfee Trojan.PWS.Qqrobber.421
W32/Sdbot.worm McAfee Trojan.PWS.Qqrobber.429
W32/Sdbot.worm McAfee Trojan.PWS.Qqrobber.426
W32/Sdbot.worm McAfee Trojan.PWS.Qqrobber.431
W32/Sdbot.worm McAfee Trojan.PWS.Qqrobber.424
W32/Sdbot.worm McAfee Trojan.MulDrop.29448
W32/Sdbot.worm McAfee BackDoor.IRC.Multibot.2

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.