Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.Proxy.1818 21.05.2007 --- Show
Trojan.PWS.Banker.9408 21.05.2007 --- Show
Trojan.PWS.LDPinch.1526 21.05.2007 --- Show
Trojan.PWS.LDPinch.1761 21.05.2007 --- Show
Trojan.PWS.Qqpass.672 21.05.2007 --- Show
BackDoor.IRC.Sdbot.1392 20.05.2007 --- Show
BackDoor.Pigeon.1560 20.05.2007 --- Show
BackDoor.Pigeon.2582 20.05.2007 --- Show
BackDoor.Pigeon.2583 20.05.2007 --- Show
BackDoor.Pigeon.2584 20.05.2007 --- Show
BackDoor.Pigeon.2585 20.05.2007 --- Show
BackDoor.Pigeon.2586 20.05.2007 --- Show
BackDoor.Pigeon.2587 20.05.2007 --- Show
BackDoor.Pigeon.2588 20.05.2007 --- Show
BackDoor.Pigeon.2589 20.05.2007 --- Show
BackDoor.Spartan 20.05.2007 --- Show
BackDoor.Swz 20.05.2007 --- Show
Trojan.DownLoader.22758 20.05.2007 --- Show
Trojan.DownLoader.22759 20.05.2007 --- Show
Trojan.DownLoader.22763 20.05.2007 --- Show
Trojan.DownLoader.22764 20.05.2007 --- Show
Trojan.DownLoader.22765 20.05.2007 --- Show
Trojan.MulDrop.6358 20.05.2007 --- Show
Trojan.MulDrop.6359 20.05.2007 --- Show
Trojan.NtRootKit.253 20.05.2007 --- Show
Trojan.NtRootKit.254 20.05.2007 --- Show
Adware.MagPlayer 19.05.2007 --- Show
BackDoor.Paziruk 19.05.2007 --- Show
BackDoor.Pigeon.2566 19.05.2007 --- Show
BackDoor.Pigeon.2580 19.05.2007 --- Show
BackDoor.Pigeon.984 19.05.2007 --- Show
Exploit.ANIFile 19.05.2007 --- Show
Trojan.Click.2334 19.05.2007 --- Show
Trojan.Click.2431 19.05.2007 --- Show
Trojan.DownLoader.15408 19.05.2007 --- Show
Trojan.DownLoader.17701 19.05.2007 --- Show
Trojan.DownLoader.20831 19.05.2007 --- Show
Trojan.DownLoader.20847 19.05.2007 --- Show
Trojan.DownLoader.22384 19.05.2007 --- Show
Trojan.DownLoader.22747 19.05.2007 --- Show
Trojan.DownLoader.22748 19.05.2007 --- Show
Trojan.DownLoader.22749 19.05.2007 --- Show
Trojan.DownLoader.22752 19.05.2007 --- Show
Trojan.DownLoader.22753 19.05.2007 --- Show
Trojan.DownLoader.22754 19.05.2007 --- Show
Trojan.DownLoader.22755 19.05.2007 --- Show
Trojan.Fakealert.271 19.05.2007 --- Show
Trojan.Packed.133 19.05.2007 --- Show
Trojan.Proxy.1387 19.05.2007 --- Show
Trojan.PWS.Banker.9261 19.05.2007 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.