Library
My library

Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Android.Spy.7090 23:49:24 16.04.2025 Show
Android.BankBot.Medusa.20 21:37:09 16.04.2025 Show
Android.Hidden.12293 15:21:53 16.04.2025 Show
Android.BankBot.Medusa.19 14:23:48 16.04.2025 Show
Android.DownLoader.5631 14:02:08 16.04.2025 Show
Adware.Dowgin.8535 14:02:02 16.04.2025 Show
Android.SpyMax.565 13:20:25 16.04.2025 Show
Android.SpyMax.564 13:16:02 16.04.2025 Show
Trojan.Siggen31.12275 03:07:04 16.04.2025 Show
Trojan.MulDrop31.6502 03:07:03 16.04.2025 Show
Trojan.MulDrop31.5696 03:07:03 16.04.2025 Show
Trojan.Siggen31.12521 03:07:03 16.04.2025 Show
Trojan.MulDrop31.9810 03:07:03 16.04.2025 Show
Trojan.DownLoader48.31568 03:07:02 16.04.2025 Show
Trojan.MulDrop31.8268 03:07:02 16.04.2025 Show
Trojan.DownLoader48.31604 03:07:02 16.04.2025 Show
Trojan.MulDrop31.8072 03:07:01 16.04.2025 Show
Trojan.DownLoader48.31402 03:07:01 16.04.2025 Show
Trojan.MulDrop31.6581 03:07:00 16.04.2025 Show
Trojan.Siggen31.12412 03:07:00 16.04.2025 Show
Trojan.DownLoader48.31656 03:07:00 16.04.2025 Show
Trojan.Siggen31.12197 03:07:00 16.04.2025 Show
Trojan.Siggen31.12729 03:07:00 16.04.2025 Show
Trojan.Siggen31.12279 03:06:59 16.04.2025 Show
Trojan.Tofsee.4448 03:06:59 16.04.2025 Show
Trojan.Siggen31.12507 03:06:59 16.04.2025 Show
Trojan.MulDrop31.7214 03:06:59 16.04.2025 Show
Trojan.DownLoader48.31563 03:06:59 16.04.2025 Show
Trojan.MulDrop31.7682 03:06:58 16.04.2025 Show
Trojan.MulDrop31.8011 03:06:58 16.04.2025 Show
Trojan.MulDrop31.6852 03:06:58 16.04.2025 Show
Trojan.Siggen31.12515 03:06:58 16.04.2025 Show
Trojan.MulDrop31.7846 03:06:58 16.04.2025 Show
Trojan.DownLoader48.31496 03:06:58 16.04.2025 Show
Trojan.Siggen31.12567 03:06:57 16.04.2025 Show
Trojan.DownLoader48.31443 03:06:57 16.04.2025 Show
Trojan.Tofsee.4554 03:06:56 16.04.2025 Show
Trojan.Bladabindi.1764 03:06:55 16.04.2025 Show
Trojan.MulDrop31.6059 03:06:54 16.04.2025 Show
Trojan.Siggen31.12707 03:06:54 16.04.2025 Show
Trojan.Siggen31.12229 03:06:54 16.04.2025 Show
Trojan.TinyNuke.69 03:06:54 16.04.2025 Show
Trojan.MulDrop31.9987 03:06:54 16.04.2025 Show
Trojan.MulDrop31.9512 03:06:54 16.04.2025 Show
Trojan.AVKill.32525 03:06:54 16.04.2025 Show
Trojan.Siggen31.12347 03:06:54 16.04.2025 Show
Trojan.DownLoader48.31455 03:06:53 16.04.2025 Show
Trojan.MulDrop31.9746 03:06:53 16.04.2025 Show
Trojan.MulDrop31.8842 03:06:53 16.04.2025 Show
Trojan.Tofsee.4436 03:06:52 16.04.2025 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.