Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

W32/Sdbot.worm aliases:

Name Vendor Dr.Web classification name
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.636
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.646
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.585
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.671
W32/Sdbot.worm McAfee BackDoor.Ninja
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.168
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.150
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.386
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.471
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.347
W32/Sdbot.worm McAfee BackDoor.Fade.10
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.139
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.309
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.87
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.681
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.680
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.678
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.679
W32/Sdbot.worm McAfee BackDoor.IRC.Loony
W32/Sdbot.worm McAfee Trojan.MulDrop.3961
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.709
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.710
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.714
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.717
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.724
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.729
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.731
W32/Sdbot.worm McAfee BackDoor.IRC.Xbot
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.767
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.769
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.747
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.739
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.735
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.742
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.751
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.779
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.743
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.772
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.766
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.508
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.694
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.734
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.774
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.749
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.758
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.793
W32/Sdbot.worm McAfee Win32.HLLW.Zurenie
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.826
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.817
W32/Sdbot.worm McAfee BackDoor.IRC.Combot

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.