Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

W32/Sdbot.worm aliases:

Name Vendor Dr.Web classification name
W32/Sdbot.worm McAfee Win32.HLLW.MyBot.45
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.3663
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.1608
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.2075
W32/Sdbot.worm McAfee BackDoor.IRC.Shabot.54
W32/Sdbot.worm McAfee BackDoor.IRC.Hau
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.3550
W32/Sdbot.worm McAfee BackDoor.IRC.Tiny.26
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.3723
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.3641
W32/Sdbot.worm McAfee BackDoor.Rbot.23
W32/Sdbot.worm McAfee BackDoor.IRC.Hata
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.3636
W32/Sdbot.worm McAfee BackDoor.IRC.Cemka.4
W32/Sdbot.worm McAfee Trojan.DownLoader.61993
W32/Sdbot.worm McAfee Trojan.DownLoader.47386
W32/Sdbot.worm McAfee Trojan.Fakealert.536
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.3637
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.472
W32/Sdbot.worm McAfee BackDoor.Raybot
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.3639
W32/Sdbot.worm McAfee BackDoor.IRC.Dos.14
W32/Sdbot.worm McAfee BackDoor.IRC.Unkbot.2
W32/Sdbot.worm McAfee BackDoor.IRC.Shabot.53
W32/Sdbot.worm McAfee BackDoor.IRC.Bot.51
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.3634
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.2896
W32/Sdbot.worm McAfee BackDoor.Bifrost.861
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.3567
W32/Sdbot.worm McAfee BackDoor.Bifrost.803
W32/Sdbot.worm McAfee Trojan.Inject.3461
W32/Sdbot.worm McAfee BackDoor.Pablos.27
W32/Sdbot.worm McAfee Trojan.MulDrop.16540
W32/Sdbot.worm McAfee Trojan.Inject.3555
W32/Sdbot.worm McAfee Trojan.PWS.Sniftp.7
W32/Sdbot.worm McAfee Trojan.MulDrop.16567
W32/Sdbot.worm McAfee Trojan.DownLoader.63190
W32/Sdbot.worm McAfee Trojan.Virtumod.420
W32/Sdbot.worm McAfee Trojan.Inject.710
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.3717
W32/Sdbot.worm McAfee BackDoor.IRC.Unkbot.7
W32/Sdbot.worm McAfee BackDoor.IRC.Unkbot.13
W32/Sdbot.worm McAfee BackDoor.IRC.Unkbot.9
W32/Sdbot.worm McAfee BackDoor.IRC.Sdbot.3721
W32/Sdbot.worm McAfee BackDoor.IRC.Unkbot.4
W32/Sdbot.worm McAfee BackDoor.IRC.Unkbot.12
W32/Sdbot.worm McAfee Trojan.PWS.Gamania.11774
W32/Sdbot.worm McAfee Trojan.MulDrop.14880
W32/Sdbot.worm McAfee Win32.HLLW.Autoruner.2311
W32/Sdbot.worm McAfee Trojan.Inject.3464

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.