Library
My library

Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Android.Spy.6766 13:58:05 17.02.2025 Show
Android.Spy.6765 13:58:00 17.02.2025 Show
Android.Spy.6764 13:57:55 17.02.2025 Show
Android.Hidden.12236 13:49:54 17.02.2025 Show
Android.Spy.6763 13:42:28 17.02.2025 Show
Android.Hidden.12235 13:32:15 17.02.2025 Show
Android.BankBot.Coper.6693 06:16:58 16.02.2025 Show
Trojan.Siggen30.58768 03:00:39 17.02.2025 Show
Trojan.Siggen30.58791 03:00:39 17.02.2025 Show
Trojan.MulDrop29.6317 03:00:39 17.02.2025 Show
Trojan.MulDrop29.6242 03:00:39 17.02.2025 Show
Trojan.Siggen30.58735 03:00:39 17.02.2025 Show
Trojan.Remcos.44 03:00:39 17.02.2025 Show
Trojan.MulDrop29.6283 03:00:39 17.02.2025 Show
Trojan.Siggen30.58667 03:00:39 17.02.2025 Show
Trojan.MulDrop29.6240 03:00:38 17.02.2025 Show
Trojan.Siggen30.58682 03:00:38 17.02.2025 Show
Trojan.Siggen30.58707 03:00:38 17.02.2025 Show
Trojan.DownLoader25.37487 03:00:38 17.02.2025 Show
BackDoor.Rejoice.21.origin 03:00:38 17.02.2025 Show
Trojan.DownLoader48.9740 03:00:38 17.02.2025 Show
Trojan.DownLoader48.9691 03:00:38 17.02.2025 Show
Trojan.Inject5.16790 03:00:38 17.02.2025 Show
Trojan.Tofsee.872 03:00:38 17.02.2025 Show
Trojan.Siggen30.58779 03:00:38 17.02.2025 Show
Trojan.Siggen30.58675 03:00:38 17.02.2025 Show
Trojan.Siggen30.58663 03:00:38 17.02.2025 Show
Trojan.MulDrop29.6149 03:00:38 17.02.2025 Show
Trojan.Siggen30.58750 03:00:38 17.02.2025 Show
Trojan.Bladabindi.742 03:00:38 17.02.2025 Show
Trojan.MulDrop29.6276 03:00:38 17.02.2025 Show
Trojan.MulDrop29.6155 03:00:38 17.02.2025 Show
Trojan.Inject5.16796 03:00:38 17.02.2025 Show
Trojan.Inject5.16795 03:00:37 17.02.2025 Show
Trojan.MulDrop29.6322 03:00:37 17.02.2025 Show
Trojan.Inject5.16808 03:00:37 17.02.2025 Show
Trojan.Siggen30.58745 03:00:37 17.02.2025 Show
Trojan.Siggen30.58759 03:00:37 17.02.2025 Show
Trojan.DownLoader48.9736 03:00:37 17.02.2025 Show
Trojan.Bladabindi.741 03:00:37 17.02.2025 Show
Trojan.DownLoader48.9715 03:00:37 17.02.2025 Show
Trojan.MulDrop29.6208 03:00:37 17.02.2025 Show
Trojan.Siggen30.58756 03:00:37 17.02.2025 Show
Trojan.DownLoader48.9747 03:00:37 17.02.2025 Show
Trojan.MulDrop29.6189 03:00:37 17.02.2025 Show
Trojan.MulDrop29.6541 03:00:37 17.02.2025 Show
Trojan.Siggen30.58662 03:00:37 17.02.2025 Show
Trojan.MulDrop29.6167 03:00:36 17.02.2025 Show
Trojan.Siggen30.58800 03:00:36 17.02.2025 Show
Trojan.Siggen30.58807 03:00:36 17.02.2025 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.