FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Adware.Gexin.23125 05:04:47 02.10.2022 Show
Trojan.MulDrop20.60515 00:22:16 02.10.2022 Show
Trojan.MulDrop20.60840 00:22:15 02.10.2022 Show
Trojan.MulDrop20.60638 00:22:15 02.10.2022 Show
Adware.MultiPlug.3814 00:22:13 02.10.2022 Show
Trojan.Siggen18.53000 00:22:11 02.10.2022 Show
Trojan.MulDrop20.60818 00:22:10 02.10.2022 Show
Trojan.DownLoader45.21334 00:22:08 02.10.2022 Show
Trojan.DownLoader45.21369 00:22:03 02.10.2022 Show
Trojan.Inject4.44290 00:22:02 02.10.2022 Show
Trojan.MulDrop20.60789 00:22:02 02.10.2022 Show
Trojan.MulDrop20.60567 00:22:02 02.10.2022 Show
Trojan.Siggen18.53150 00:22:00 02.10.2022 Show
Trojan.Siggen18.52906 00:21:58 02.10.2022 Show
Trojan.Siggen18.53099 00:21:57 02.10.2022 Show
Trojan.PWS.Siggen3.22802 00:21:54 02.10.2022 Show
Trojan.Siggen18.52838 00:21:53 02.10.2022 Show
Trojan.Inject4.44267 00:21:52 02.10.2022 Show
Trojan.MulDrop20.60985 00:21:50 02.10.2022 Show
Trojan.MulDrop20.60503 00:21:50 02.10.2022 Show
Trojan.MulDrop20.61096 00:21:48 02.10.2022 Show
Trojan.Siggen18.52926 00:21:48 02.10.2022 Show
Trojan.MulDrop20.60663 00:21:46 02.10.2022 Show
Trojan.DownLoader45.21329 00:21:45 02.10.2022 Show
Trojan.PWS.Siggen3.22806 00:21:40 02.10.2022 Show
Trojan.KillFiles2.959 00:21:39 02.10.2022 Show
Trojan.Siggen18.52919 00:21:38 02.10.2022 Show
Trojan.MulDrop20.61010 00:21:37 02.10.2022 Show
Trojan.Siggen18.53050 00:21:37 02.10.2022 Show
Trojan.MulDrop20.60822 00:21:36 02.10.2022 Show
Trojan.DownLoader45.21219 00:21:36 02.10.2022 Show
Trojan.MulDrop20.60891 00:21:34 02.10.2022 Show
Trojan.DownLoader45.21436 00:21:33 02.10.2022 Show
Trojan.DownLoader45.21365 00:21:32 02.10.2022 Show
Trojan.Inject4.44272 00:21:31 02.10.2022 Show
Trojan.MulDrop20.60767 00:21:31 02.10.2022 Show
Trojan.MulDrop20.60994 00:21:30 02.10.2022 Show
Trojan.Inject4.44243 00:21:27 02.10.2022 Show
Trojan.Siggen18.53170 00:21:26 02.10.2022 Show
Trojan.Siggen18.52894 00:21:24 02.10.2022 Show
Trojan.Inject4.44280 00:21:24 02.10.2022 Show
Trojan.MulDrop20.60558 00:21:23 02.10.2022 Show
Trojan.DownLoader45.21233 00:21:21 02.10.2022 Show
Trojan.MulDrop20.60739 00:21:19 02.10.2022 Show
Trojan.MulDrop20.60719 00:21:18 02.10.2022 Show
Trojan.Inject4.44255 00:21:18 02.10.2022 Show
Trojan.Siggen18.52954 00:21:16 02.10.2022 Show
Trojan.Siggen18.52871 00:21:16 02.10.2022 Show
Trojan.DownLoader45.21232 00:21:16 02.10.2022 Show
Trojan.MulDrop20.60588 00:21:14 02.10.2022 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies