Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

W32/Sdbot.worm aliases:

Name Vendor Dr.Web classification name
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.4632
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.3762
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.2158
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.4636
W32/Sdbot.worm McAfee BackDoor.IRC.Bot.2
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.2066
W32/Sdbot.worm McAfee BackDoor.Salidol
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.2220
W32/Sdbot.worm McAfee Win32.HLLM.Beagle.45144
W32/Sdbot.worm McAfee BackDoor.Pigeon.6620
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.2189
W32/Sdbot.worm McAfee BackDoor.Servu.50011
W32/Sdbot.worm McAfee Win32.HLLW.MyBot.196
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.504
W32/Sdbot.worm McAfee Trojan.MulDrop.3991
W32/Sdbot.worm McAfee Trojan.PWS.Siggen.89
W32/Sdbot.worm McAfee Trojan.PWS.Siggen.80
W32/Sdbot.worm McAfee Trojan.Inject.5485
W32/Sdbot.worm McAfee Trojan.Packed.2354
W32/Sdbot.worm McAfee BackDoor.Pigeon.9115
W32/Sdbot.worm McAfee Win32.HLLW.MyBot.43
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.924
W32/Sdbot.worm McAfee BackDoor.IRC.Sin
W32/Sdbot.worm McAfee Win32.HLLW.MyBot.22
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.4660
W32/Sdbot.worm McAfee Trojan.DownLoader.24862
W32/Sdbot.worm McAfee Trojan.Click.4913
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.3755
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.4675
W32/Sdbot.worm McAfee BackDoor.IRC.Bot.111
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.3529
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.4661
W32/Sdbot.worm McAfee Trojan.Inject.5484
W32/Sdbot.worm McAfee Trojan.MulDrop.30301
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.4689
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.4686
W32/Sdbot.worm McAfee Trojan.Siggen.2129
W32/Sdbot.worm McAfee Trojan.Siggen.2122
W32/Sdbot.worm McAfee Trojan.Siggen.2117
W32/Sdbot.worm McAfee Trojan.Siggen.2127
W32/Sdbot.worm McAfee Trojan.Siggen.2093
W32/Sdbot.worm McAfee Trojan.Siggen.2119
W32/Sdbot.worm McAfee Trojan.Siggen.2121
W32/Sdbot.worm McAfee Trojan.Siggen.2124
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.4663
W32/Sdbot.worm McAfee Trojan.DownLoader.50961
W32/Sdbot.worm McAfee Trojan.PWS.Hukle.76
W32/Sdbot.worm McAfee Trojan.Siggen.1709
W32/Sdbot.worm McAfee Trojan.Siggen.1870
W32/Sdbot.worm McAfee Trojan.DownLoader.57592

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.