Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Android.Hidden.12268 04:52:43 28.03.2025 Show
Trojan.DownLoader48.22480 03:15:07 28.03.2025 Show
Trojan.MulDrop30.2304 03:15:07 28.03.2025 Show
Trojan.MulDrop30.1467 03:15:07 28.03.2025 Show
Trojan.Siggen31.4340 03:15:06 28.03.2025 Show
Trojan.MulDrop30.5282 03:15:05 28.03.2025 Show
Trojan.MulDrop30.8220 03:15:05 28.03.2025 Show
Trojan.Siggen31.4530 03:15:05 28.03.2025 Show
Trojan.MulDrop30.1765 03:15:05 28.03.2025 Show
Trojan.DownLoader48.22581 03:15:04 28.03.2025 Show
Trojan.DownLoader48.22424 03:15:04 28.03.2025 Show
Trojan.DownLoader48.22506 03:15:02 28.03.2025 Show
Trojan.MulDrop30.1635 03:15:01 28.03.2025 Show
Trojan.MulDrop30.1581 03:15:01 28.03.2025 Show
Trojan.DownLoader48.22400 03:15:01 28.03.2025 Show
Trojan.KillProc2.24322 03:15:01 28.03.2025 Show
Trojan.MulDrop30.1658 03:15:00 28.03.2025 Show
Trojan.MulDrop30.1560 03:15:00 28.03.2025 Show
Trojan.MulDrop30.1129 03:15:00 28.03.2025 Show
Trojan.DownLoader48.22431 03:14:59 28.03.2025 Show
Trojan.MulDrop30.1570 03:14:59 28.03.2025 Show
Trojan.DownLoader48.22614 03:14:59 28.03.2025 Show
Trojan.MulDrop30.1027 03:14:59 28.03.2025 Show
Trojan.KillProc2.24320 03:14:58 28.03.2025 Show
Trojan.MulDrop30.1509 03:14:56 28.03.2025 Show
Trojan.MulDrop30.1591 03:14:55 28.03.2025 Show
Trojan.MulDrop30.1226 03:14:54 28.03.2025 Show
Trojan.MulDrop30.2253 03:14:54 28.03.2025 Show
Trojan.MulDrop30.2171 03:14:54 28.03.2025 Show
Trojan.MulDrop30.5461 03:14:54 28.03.2025 Show
Trojan.DownLoader48.22377 03:14:52 28.03.2025 Show
Trojan.MulDrop30.2419 03:14:52 28.03.2025 Show
Trojan.MulDrop30.1919 03:14:51 28.03.2025 Show
Trojan.MulDrop30.6104 03:14:51 28.03.2025 Show
Trojan.MulDrop30.1779 03:14:51 28.03.2025 Show
Trojan.MulDrop30.8107 03:14:51 28.03.2025 Show
Trojan.Siggen31.4527 03:14:50 28.03.2025 Show
Trojan.MulDrop30.5391 03:14:50 28.03.2025 Show
Trojan.MulDrop30.5466 03:14:49 28.03.2025 Show
Trojan.MulDrop30.1559 03:14:48 28.03.2025 Show
Trojan.MulDrop30.6402 03:14:47 28.03.2025 Show
Trojan.MulDrop30.5338 03:14:47 28.03.2025 Show
Trojan.MulDrop30.1251 03:14:47 28.03.2025 Show
Trojan.MulDrop30.6584 03:14:46 28.03.2025 Show
Trojan.DownLoader48.22422 03:14:44 28.03.2025 Show
Trojan.MulDrop30.5588 03:14:43 28.03.2025 Show
Trojan.DownLoader48.22385 03:14:43 28.03.2025 Show
Trojan.DownLoader48.22509 03:14:42 28.03.2025 Show
Trojan.Siggen31.4405 03:14:42 28.03.2025 Show
Trojan.MulDrop30.5033 03:14:42 28.03.2025 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.