Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

application Iroffer aliases:

Name Vendor Dr.Web classification name
application Iroffer McAfee Trojan.MulDrop.817
application Iroffer McAfee BackDoor.Rohbot
application Iroffer McAfee BackDoor.Iroffer.142
application Iroffer McAfee BackDoor.IRC.Sdbot.based
application Iroffer McAfee Win32.IRC.Bot.based
application Iroffer McAfee BackDoor.Iroffer.1231
application Iroffer McAfee BackDoor.Iroffer.1209
application Iroffer McAfee BackDoor.Iroffer.1214
application Iroffer McAfee BackDoor.Iroffer.11
application Iroffer McAfee BackDoor.Iroffer.16
application Iroffer McAfee BackDoor.Iroffer.1219
application Iroffer McAfee BackDoor.Iroffer.1303
application Iroffer McAfee BackDoor.Iroffer.1308
application Iroffer McAfee BackDoor.Servu.4004
application Iroffer McAfee BackDoor.Iroffer.1401
application Iroffer McAfee BackDoor.Iroffer.1309
application Iroffer McAfee BackDoor.Iroffer.1221
application Iroffer McAfee BackDoor.Iroffer.1310
application Iroffer McAfee BackDoor.Iroffer.1213
application Iroffer McAfee Trojan.Flood.22016
application Iroffer McAfee BackDoor.Irrofer.1401
application Iroffer McAfee Tool.FireDaemon
application Iroffer McAfee BackDoor.Iroffer
application Iroffer McAfee BackDoor.Iroffer.1239
application Iroffer McAfee BackDoor.Iroffer.1233
application Iroffer McAfee BackDoor.Iroffer.13
application Iroffer McAfee Tool.Starter
application Iroffer McAfee BackDoor.Iroffer.1402
application Iroffer McAfee BackDoor.Iroffer.14
application Iroffer McAfee BackDoor.Iroffer.1220
application Iroffer McAfee BackDoor.Servu.50011
application Iroffer McAfee BackDoor.Iroffer.1217
application Iroffer McAfee BackDoor.Irrofer.1402

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.