Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.Siggen30.58489 03:01:00 15.02.2025 Show
Trojan.Inject5.16725 03:00:59 15.02.2025 Show
Trojan.DownLoader48.9421 03:00:59 15.02.2025 Show
Trojan.Siggen30.58476 03:00:59 15.02.2025 Show
Trojan.DownLoader48.9444 03:00:58 15.02.2025 Show
Trojan.MulDrop29.5900 03:00:58 15.02.2025 Show
Trojan.MulDrop29.5886 03:00:58 15.02.2025 Show
Trojan.Siggen30.58464 03:00:58 15.02.2025 Show
Trojan.DownLoader48.9373 03:00:57 15.02.2025 Show
Trojan.PWS.Siggen3.39593 03:00:57 15.02.2025 Show
Trojan.DownLoader48.9380 03:00:57 15.02.2025 Show
Trojan.MulDrop29.5902 03:00:57 15.02.2025 Show
Trojan.MulDrop29.5969 03:00:57 15.02.2025 Show
Trojan.MulDrop29.5843 03:00:56 15.02.2025 Show
Trojan.MulDrop29.5875 03:00:56 15.02.2025 Show
Trojan.DownLoader48.9363 03:00:56 15.02.2025 Show
Trojan.MulDrop29.5901 03:00:56 15.02.2025 Show
Trojan.MulDrop29.5962 03:00:56 15.02.2025 Show
Trojan.DownLoader48.9404 03:00:56 15.02.2025 Show
Trojan.Inject5.16728 03:00:55 15.02.2025 Show
Trojan.MulDrop29.5942 03:00:55 15.02.2025 Show
Trojan.MulDrop29.5844 03:00:55 15.02.2025 Show
Trojan.DownLoader48.9347 03:00:55 15.02.2025 Show
Trojan.MulDrop29.5894 03:00:55 15.02.2025 Show
Trojan.Siggen30.58453 03:00:54 15.02.2025 Show
Trojan.MulDrop29.5920 03:00:54 15.02.2025 Show
Trojan.Hosts.52342 03:00:54 15.02.2025 Show
Trojan.DownLoader48.9392 03:00:54 15.02.2025 Show
Trojan.MulDrop29.5904 03:00:53 15.02.2025 Show
Trojan.MulDrop29.5848 03:00:53 15.02.2025 Show
Trojan.MulDrop29.5876 03:00:53 15.02.2025 Show
Trojan.Siggen30.58439 03:00:52 15.02.2025 Show
Trojan.Inject5.16698 03:00:52 15.02.2025 Show
Trojan.MulDrop29.5865 03:00:52 15.02.2025 Show
Trojan.MulDrop29.5976 03:00:52 15.02.2025 Show
Trojan.DownLoader48.9387 03:00:51 15.02.2025 Show
Trojan.Siggen30.58473 03:00:51 15.02.2025 Show
Trojan.Siggen30.58518 03:00:51 15.02.2025 Show
Trojan.Siggen30.58400 03:00:51 15.02.2025 Show
Trojan.MulDrop29.5958 03:00:51 15.02.2025 Show
Trojan.Inject5.16689 03:00:50 15.02.2025 Show
Trojan.MulDrop29.5914 03:00:50 15.02.2025 Show
Trojan.Siggen30.58520 03:00:50 15.02.2025 Show
Trojan.MulDrop29.5847 03:00:50 15.02.2025 Show
Trojan.MulDrop29.5949 03:00:49 15.02.2025 Show
Trojan.Siggen30.58487 03:00:49 15.02.2025 Show
Trojan.MulDrop29.5955 03:00:49 15.02.2025 Show
Trojan.MulDrop29.5959 03:00:49 15.02.2025 Show
Trojan.DownLoader48.9397 03:00:49 15.02.2025 Show
Trojan.Siggen30.58448 03:00:49 15.02.2025 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.