Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.Hosts.53234 03:13:00 12.02.2026 Show
Trojan.MulDrop35.47301 03:13:00 12.02.2026 Show
Trojan.MulDrop35.48444 03:13:00 12.02.2026 Show
Trojan.Inject6.26057 03:12:59 12.02.2026 Show
Trojan.Siggen32.24317 03:12:59 12.02.2026 Show
Trojan.MulDrop35.48121 03:12:59 12.02.2026 Show
Trojan.DownLoader49.33677 03:12:59 12.02.2026 Show
Trojan.DownLoader49.33654 03:12:59 12.02.2026 Show
Trojan.MulDrop35.47749 03:12:59 12.02.2026 Show
Trojan.MulDrop35.47627 03:12:59 12.02.2026 Show
Trojan.DownLoader49.33707 03:12:58 12.02.2026 Show
Trojan.MulDrop35.47968 03:12:58 12.02.2026 Show
Trojan.DownLoader49.33764 03:12:58 12.02.2026 Show
Trojan.Siggen32.24239 03:12:58 12.02.2026 Show
Trojan.MulDrop35.48568 03:12:58 12.02.2026 Show
Trojan.MulDrop35.47707 03:12:58 12.02.2026 Show
Trojan.MulDrop35.47535 03:12:57 12.02.2026 Show
Trojan.Inject6.26080 03:12:57 12.02.2026 Show
Trojan.MulDrop35.48105 03:12:57 12.02.2026 Show
Trojan.MulDrop35.48258 03:12:57 12.02.2026 Show
Trojan.Siggen32.24063 03:12:57 12.02.2026 Show
Trojan.MulDrop35.47682 03:12:57 12.02.2026 Show
Trojan.MulDrop35.46988 03:12:57 12.02.2026 Show
Trojan.MulDrop35.47954 03:12:57 12.02.2026 Show
Trojan.DownLoader49.33630 03:12:57 12.02.2026 Show
Trojan.DownLoader49.33585 03:12:57 12.02.2026 Show
Trojan.Siggen32.24114 03:12:57 12.02.2026 Show
Trojan.MulDrop35.47985 03:12:57 12.02.2026 Show
Trojan.MulDrop35.47950 03:12:57 12.02.2026 Show
Trojan.MulDrop35.47692 03:12:57 12.02.2026 Show
Trojan.MulDrop35.47711 03:12:56 12.02.2026 Show
Trojan.MulDrop35.48401 03:12:56 12.02.2026 Show
Trojan.MulDrop35.47769 03:12:56 12.02.2026 Show
Trojan.DownLoader49.33601 03:12:56 12.02.2026 Show
Trojan.Siggen32.24466 03:12:56 12.02.2026 Show
Trojan.MulDrop35.48087 03:12:56 12.02.2026 Show
Trojan.MulDrop35.47883 03:12:56 12.02.2026 Show
Trojan.MulDrop35.47608 03:12:55 12.02.2026 Show
Trojan.MulDrop35.47395 03:12:54 12.02.2026 Show
Trojan.MulDrop35.47376 03:12:54 12.02.2026 Show
Trojan.DownLoader49.33715 03:12:54 12.02.2026 Show
Trojan.MulDrop35.47593 03:12:54 12.02.2026 Show
Trojan.MulDrop35.47952 03:12:54 12.02.2026 Show
Trojan.MulDrop35.46999 03:12:54 12.02.2026 Show
Trojan.MulDrop35.48538 03:12:54 12.02.2026 Show
Trojan.Siggen32.24132 03:12:53 12.02.2026 Show
Trojan.MulDrop35.47654 03:12:53 12.02.2026 Show
Trojan.MulDrop35.47732 03:12:53 12.02.2026 Show
Trojan.MulDrop35.48357 03:12:53 12.02.2026 Show
Trojan.Inject6.25998 03:12:51 12.02.2026 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.