Library
My library

Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.DownLoader48.22748 03:17:20 29.03.2025 Show
Trojan.Inject5.19815 03:17:20 29.03.2025 Show
Trojan.MulDrop30.8256 03:17:20 29.03.2025 Show
Trojan.DownLoader48.22824 03:17:20 29.03.2025 Show
Trojan.DownLoader48.22896 03:17:19 29.03.2025 Show
Trojan.MulDrop30.11073 03:17:18 29.03.2025 Show
Trojan.MulDrop30.8422 03:17:16 29.03.2025 Show
Trojan.MulDrop30.9215 03:17:14 29.03.2025 Show
Trojan.Siggen31.4681 03:17:12 29.03.2025 Show
Trojan.DownLoader48.22810 03:17:09 29.03.2025 Show
Trojan.MulDrop30.12525 03:17:05 29.03.2025 Show
Trojan.Siggen31.4670 03:17:04 29.03.2025 Show
Trojan.MulDrop30.12510 03:17:04 29.03.2025 Show
Trojan.MulDrop30.8249 03:17:01 29.03.2025 Show
Trojan.Siggen31.4646 03:17:00 29.03.2025 Show
Trojan.Siggen31.4764 03:16:59 29.03.2025 Show
Trojan.MulDrop30.8257 03:16:56 29.03.2025 Show
Trojan.MulDrop30.9088 03:16:55 29.03.2025 Show
Trojan.MulDrop30.6882 03:16:51 29.03.2025 Show
Trojan.Inject5.19834 03:16:50 29.03.2025 Show
Trojan.DownLoader48.22870 03:16:49 29.03.2025 Show
Trojan.DownLoader48.22747 03:16:48 29.03.2025 Show
Trojan.Siggen31.4555 03:16:46 29.03.2025 Show
Trojan.MulDrop30.9033 03:16:43 29.03.2025 Show
Trojan.Siggen31.4704 03:16:40 29.03.2025 Show
Trojan.DownLoader48.22817 03:16:39 29.03.2025 Show
Trojan.BankBot.750 03:16:39 29.03.2025 Show
Trojan.DownLoader48.22877 03:16:35 29.03.2025 Show
Trojan.Siggen31.4702 03:16:35 29.03.2025 Show
Trojan.Bladabindi.1291 03:16:33 29.03.2025 Show
Trojan.MulDrop30.10061 03:16:33 29.03.2025 Show
Trojan.DownLoader48.22865 03:16:32 29.03.2025 Show
Trojan.MulDrop30.6602 03:16:32 29.03.2025 Show
Trojan.Inject5.19857 03:16:31 29.03.2025 Show
Trojan.DownLoader48.22900 03:16:31 29.03.2025 Show
Trojan.MulDrop30.6612 03:16:29 29.03.2025 Show
Trojan.DownLoader48.22955 03:16:28 29.03.2025 Show
Trojan.MulDrop30.8053 03:16:25 29.03.2025 Show
Trojan.DownLoader48.23088 03:16:25 29.03.2025 Show
Trojan.Siggen31.4671 03:16:24 29.03.2025 Show
Trojan.MulDrop30.8187 03:16:22 29.03.2025 Show
Trojan.Siggen31.4804 03:16:20 29.03.2025 Show
Trojan.DownLoader48.22893 03:16:17 29.03.2025 Show
Trojan.MulDrop30.8362 03:16:17 29.03.2025 Show
Trojan.DownLoader48.22730 03:16:17 29.03.2025 Show
Trojan.MulDrop30.10694 03:16:17 29.03.2025 Show
Trojan.MulDrop30.7350 03:16:16 29.03.2025 Show
Trojan.MulDrop30.8248 03:16:16 29.03.2025 Show
Trojan.DownLoader48.22978 03:16:15 29.03.2025 Show
Trojan.Siggen31.4630 03:16:13 29.03.2025 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.