Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Android.RemoteCode.8322 06:43:11 15.04.2024 Show
Adware.Gexin.23497 06:43:03 14.04.2024 Show
Android.Gexin.1845 06:42:58 14.04.2024 Show
Adware.Dowgin.8480 06:42:50 14.04.2024 Show
Adware.Gexin.23499 06:42:46 15.04.2024 Show
Linux.Siggen.7004 06:05:03 15.04.2024 Show
Linux.Siggen.7005 06:05:02 15.04.2024 Show
Linux.Siggen.7006 06:00:03 15.04.2024 Show
Linux.Siggen.7003 06:00:03 14.04.2024 Show
Adware.Gexin.23498 05:17:56 15.04.2024 Show
Trojan.Siggen28.25074 03:07:58 15.04.2024 Show
Trojan.Siggen28.24615 03:07:58 15.04.2024 Show
Trojan.Siggen28.24845 03:07:58 15.04.2024 Show
Trojan.Siggen28.25121 03:07:57 15.04.2024 Show
Trojan.Siggen28.24711 03:07:57 15.04.2024 Show
Trojan.MulDrop26.54885 03:07:56 15.04.2024 Show
Trojan.MulDrop26.53957 03:07:56 15.04.2024 Show
Trojan.Siggen28.25077 03:07:56 15.04.2024 Show
Trojan.DownLoader46.57777 03:07:56 15.04.2024 Show
Trojan.MulDrop26.54300 03:07:55 15.04.2024 Show
Trojan.MulDrop26.53651 03:07:55 15.04.2024 Show
Trojan.Siggen28.24370 03:07:55 15.04.2024 Show
Trojan.Siggen28.24456 03:07:54 15.04.2024 Show
Trojan.Siggen28.24534 03:07:54 15.04.2024 Show
Trojan.Siggen28.24763 03:07:53 15.04.2024 Show
Trojan.Siggen28.24625 03:07:53 15.04.2024 Show
Trojan.Siggen28.24997 03:07:53 15.04.2024 Show
Trojan.Inject5.4053 03:07:52 15.04.2024 Show
Trojan.MulDrop26.53630 03:07:52 15.04.2024 Show
Trojan.DnsChange.17488 03:07:52 15.04.2024 Show
Trojan.MulDrop26.53935 03:07:52 15.04.2024 Show
Trojan.Siggen28.24790 03:07:52 15.04.2024 Show
Trojan.MulDrop26.53658 03:07:52 15.04.2024 Show
Trojan.Siggen28.24989 03:07:51 15.04.2024 Show
Trojan.MulDrop26.54818 03:07:51 15.04.2024 Show
Trojan.DownLoader46.57666 03:07:50 15.04.2024 Show
Trojan.MulDrop26.53749 03:07:50 15.04.2024 Show
Trojan.Siggen28.24550 03:07:50 15.04.2024 Show
Trojan.Siggen28.24450 03:07:50 15.04.2024 Show
Trojan.MulDrop26.53832 03:07:50 15.04.2024 Show
Trojan.MulDrop26.53952 03:07:50 15.04.2024 Show
Trojan.Siggen28.24620 03:07:50 15.04.2024 Show
Trojan.DownLoader46.57721 03:07:50 15.04.2024 Show
Trojan.DownLoader46.57734 03:07:49 15.04.2024 Show
Trojan.Siggen28.25012 03:07:49 15.04.2024 Show
Trojan.DnsChange.17534 03:07:49 15.04.2024 Show
Trojan.Siggen28.24627 03:07:48 15.04.2024 Show
Trojan.MulDrop26.54203 03:07:48 15.04.2024 Show
Trojan.MulDrop26.54218 03:07:48 15.04.2024 Show
Trojan.DownLoader46.57780 03:07:48 15.04.2024 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.