Library
My library

Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Android.Hidden.12313 30.04 30.04.2025 Show
Trojan.MulDrop31.41791 30.04 30.04.2025 Show
Trojan.DownLoader48.36807 30.04 30.04.2025 Show
Trojan.MulDrop31.40795 30.04 30.04.2025 Show
Trojan.MulDrop31.41398 30.04 30.04.2025 Show
Trojan.MulDrop31.44194 30.04 30.04.2025 Show
Trojan.MulDrop31.41725 30.04 30.04.2025 Show
Trojan.MulDrop31.44493 30.04 30.04.2025 Show
Trojan.MulDrop31.40831 30.04 30.04.2025 Show
Trojan.Siggen31.20062 30.04 30.04.2025 Show
Trojan.DownLoader48.36523 30.04 30.04.2025 Show
Trojan.MulDrop31.41884 30.04 30.04.2025 Show
Trojan.DownLoader48.36533 30.04 30.04.2025 Show
Trojan.Inject5.26600 30.04 30.04.2025 Show
Trojan.Siggen31.19989 30.04 30.04.2025 Show
Trojan.Inject5.25746 30.04 30.04.2025 Show
Trojan.MulDrop31.39761 30.04 30.04.2025 Show
Trojan.Inject5.25961 30.04 30.04.2025 Show
Trojan.Siggen31.20493 30.04 30.04.2025 Show
Trojan.MulDrop31.44288 30.04 30.04.2025 Show
Trojan.MulDrop31.44452 30.04 30.04.2025 Show
Trojan.MulDrop31.40695 30.04 30.04.2025 Show
Trojan.Inject5.26118 30.04 30.04.2025 Show
Trojan.Inject5.26053 30.04 30.04.2025 Show
Trojan.MulDrop31.42081 30.04 30.04.2025 Show
Trojan.MulDrop31.43919 30.04 30.04.2025 Show
Trojan.MulDrop31.44439 30.04 30.04.2025 Show
Trojan.Siggen31.20221 30.04 30.04.2025 Show
Trojan.MulDrop31.44038 30.04 30.04.2025 Show
Trojan.Siggen31.20000 30.04 30.04.2025 Show
Trojan.MulDrop31.42146 30.04 30.04.2025 Show
Trojan.Inject5.25897 30.04 30.04.2025 Show
Trojan.MulDrop31.39758 30.04 30.04.2025 Show
Trojan.MulDrop31.41356 30.04 30.04.2025 Show
Trojan.MulDrop31.42655 30.04 30.04.2025 Show
Trojan.MulDrop31.40545 30.04 30.04.2025 Show
Trojan.Siggen31.20499 30.04 30.04.2025 Show
Trojan.MulDrop31.41608 30.04 30.04.2025 Show
Trojan.MulDrop31.44662 30.04 30.04.2025 Show
Trojan.MulDrop31.40595 30.04 30.04.2025 Show
Trojan.MulDrop31.42191 30.04 30.04.2025 Show
Trojan.MulDrop31.39793 30.04 30.04.2025 Show
Trojan.Siggen31.19888 30.04 30.04.2025 Show
Trojan.Siggen31.20341 30.04 30.04.2025 Show
Trojan.Siggen31.20057 30.04 30.04.2025 Show
Trojan.MulDrop31.41250 30.04 30.04.2025 Show
Trojan.MulDrop31.43579 30.04 30.04.2025 Show
Trojan.MulDrop31.41807 30.04 30.04.2025 Show
Trojan.MulDrop31.41197 30.04 30.04.2025 Show
Trojan.MulDrop31.41541 30.04 30.04.2025 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.