The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Android.BackDoor – family of Trojans that target mobile devices under Android OS and are capable of executing commands from cybercriminals. Depending on the modification, the Trojans can send text messages, open certain URLs in the installed web browser, gather information on the infected device, provide cybercriminals with phone book information, download other applications, and perform other malicious actions.
Android.BackDoor.2650
Android.BackDoor.2651
Android.BackDoor.2652
Android.BackDoor.2654
Android.BackDoor.2655
Android.BackDoor.2656
Android.BackDoor.2657
Android.BackDoor.2658
Android.BackDoor.2659
Android.BackDoor.2660
Android.BackDoor.2661
Android.BackDoor.2662
Android.BackDoor.2665
Android.BackDoor.2667
Android.BackDoor.2669
Android.BackDoor.2672
Android.BackDoor.2676
Android.BackDoor.2678
Android.BackDoor.2680
Android.BackDoor.2682
Android.BackDoor.2684
Android.BackDoor.2686
Android.BackDoor.2687
Android.BackDoor.2688
Android.BackDoor.2690
Android.BackDoor.2691
Android.BackDoor.2692
Android.BackDoor.2693
Android.BackDoor.2694
Android.BackDoor.2695
Android.BackDoor.2696
Android.BackDoor.2697
Android.BackDoor.2698
Android.BackDoor.2699
Android.BackDoor.2700
Android.BackDoor.2701
Android.BackDoor.2702
Android.BackDoor.2703
Android.BackDoor.2704
Android.BackDoor.2705
Android.BackDoor.2706
Android.BackDoor.2707
Android.BackDoor.2708
Android.BackDoor.2709
Android.BackDoor.2710
Android.BackDoor.2711
Android.BackDoor.2712
Android.BackDoor.2713
Android.BackDoor.2714
Android.BackDoor.2715
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.
© Doctor Web
2003 — 2022
Doctor Web to rosyjski producent oprogramowania antywirusowego Dr.Web. Rozwijamy nasze produkty od 1992 roku.