Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Android.MulDrop.7683 06:39:40 04.03.2026 Show
Android.MulDrop.7680 06:28:51 03.03.2026 Show
Android.MulDrop.7682 06:22:30 04.03.2026 Show
Android.MobiDash.9443 06:10:16 03.03.2026 Show
Android.MobiDash.9445 05:29:29 03.03.2026 Show
Android.BankBot.16345 05:22:15 03.03.2026 Show
Android.MobiDash.9444 05:00:11 03.03.2026 Show
Trojan.MulDrop36.5965 03:05:31 04.03.2026 Show
Trojan.MulDrop36.5613 03:05:31 04.03.2026 Show
Trojan.MulDrop36.5602 03:05:30 04.03.2026 Show
Trojan.Siggen32.27349 03:05:30 04.03.2026 Show
Trojan.Siggen32.27397 03:05:30 04.03.2026 Show
Trojan.MulDrop36.5642 03:05:30 04.03.2026 Show
Trojan.MulDrop36.5811 03:05:30 04.03.2026 Show
Trojan.MulDrop36.5754 03:05:30 04.03.2026 Show
Trojan.MulDrop36.5774 03:05:29 04.03.2026 Show
Trojan.MulDrop36.6129 03:05:28 04.03.2026 Show
Trojan.MulDrop36.6205 03:05:28 04.03.2026 Show
Trojan.MulDrop36.5690 03:05:26 04.03.2026 Show
Trojan.MulDrop36.5894 03:05:26 04.03.2026 Show
Trojan.MulDrop36.6065 03:05:26 04.03.2026 Show
Trojan.MulDrop36.6171 03:05:25 04.03.2026 Show
Trojan.MulDrop36.5929 03:05:25 04.03.2026 Show
Trojan.MulDrop36.6049 03:05:25 04.03.2026 Show
Trojan.MulDrop36.5679 03:05:25 04.03.2026 Show
Trojan.Siggen32.27375 03:05:24 04.03.2026 Show
Trojan.MulDrop36.5873 03:05:24 04.03.2026 Show
Trojan.MulDrop36.5628 03:05:24 04.03.2026 Show
Trojan.MulDrop36.6133 03:05:24 04.03.2026 Show
Trojan.Inject6.28042 03:05:23 04.03.2026 Show
Trojan.MulDrop36.6122 03:05:23 04.03.2026 Show
Trojan.Inject6.28071 03:05:23 04.03.2026 Show
Trojan.Siggen32.27454 03:05:22 04.03.2026 Show
Trojan.MulDrop36.5895 03:05:22 04.03.2026 Show
Trojan.MulDrop36.5682 03:05:22 04.03.2026 Show
Trojan.MulDrop36.6112 03:05:22 04.03.2026 Show
Trojan.Tofsee.7104 03:05:21 04.03.2026 Show
Trojan.MulDrop36.6202 03:05:20 04.03.2026 Show
Trojan.Siggen32.27550 03:05:20 04.03.2026 Show
Trojan.MulDrop36.6624 03:05:19 04.03.2026 Show
Trojan.MulDrop36.5938 03:05:19 04.03.2026 Show
Trojan.Siggen32.27444 03:05:19 04.03.2026 Show
Trojan.MulDrop36.5942 03:05:19 04.03.2026 Show
Trojan.Siggen32.27363 03:05:18 04.03.2026 Show
Trojan.MulDrop36.5925 03:05:18 04.03.2026 Show
Trojan.MulDrop36.5718 03:05:18 04.03.2026 Show
Trojan.PWS.Steam.39287 03:05:17 04.03.2026 Show
Trojan.MulDrop36.5702 03:05:17 04.03.2026 Show
Trojan.PWS.Siggen5.32252 03:05:17 04.03.2026 Show
Trojan.Encoder.44520 03:05:16 04.03.2026 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.