Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor.Trojan in virus library:

A class of malware that can execute commands from a remote server and allow attackers to remotely control an infected device.

Backdoor.Trojan aliases:

Name Vendor Dr.Web classification name
Backdoor.Trojan Symantec Trojan.Slyde
Backdoor.Trojan Symantec BackDoor.BO2k
Backdoor.Trojan Symantec BackDoor.Hay
Backdoor.Trojan Symantec Trojan.NCW
Backdoor.Trojan Symantec BackDoor.Recoder.10
Backdoor.Trojan Symantec Trojan.HackPassword
Backdoor.Trojan Symantec BackDoor.Xrat.25
Backdoor.Trojan Symantec BackDoor.Xrat.26
Backdoor.Trojan Symantec BackDoor.Xrat.28
Backdoor.Trojan Symantec Trojan.Proxy.68
Backdoor.Trojan Symantec BackDoor.TAG
Backdoor.Trojan Symantec BackDoor.HangUp.47488
Backdoor.Trojan Symantec Trojan.DownLoader.6371
Backdoor.Trojan Symantec BackDoor.VHM.2
Backdoor.Trojan Symantec BackDoor.Generic.1097
Backdoor.Trojan Symantec BackDoor.IRC.Sbot.21
Backdoor.Trojan Symantec BackDoor.Generic.1106
Backdoor.Trojan Symantec BackDoor.Ulrbot
Backdoor.Trojan Symantec Trojan.PWS.Shanpa
Backdoor.Trojan Symantec Trojan.Morgoth.16384
Backdoor.Trojan Symantec Trojan.DownLoader.1663
Backdoor.Trojan Symantec Trojan.StartPage.424
Backdoor.Trojan Symantec Trojan.Proxy.413
Backdoor.Trojan Symantec Trojan.Proxy.149
Backdoor.Trojan Symantec BackDoor.Aphex.11
Backdoor.Trojan Symantec BackDoor.IRC.Hax
Backdoor.Trojan Symantec Trojan.Captio
Backdoor.Trojan Symantec Trojan.Click.165
Backdoor.Trojan Symantec BackDoor.WinEgg.17
Backdoor.Trojan Symantec BackDoor.Nuclearat.62
Backdoor.Trojan Symantec BackDoor.Insanor
Backdoor.Trojan Symantec Trojan.Notask
Backdoor.Trojan Symantec Trojan.AVKill.67
Backdoor.Trojan Symantec Trojan.Flood.22016
Backdoor.Trojan Symantec Trojan.GoldSpy
Backdoor.Trojan Symantec Trojan.MulDrop.1448
Backdoor.Trojan Symantec Trojan.MulDrop.831
Backdoor.Trojan Symantec Trojan.PWS.Bolvila
Backdoor.Trojan Symantec BackDoor.Facil
Backdoor.Trojan Symantec BackDoor.Rising
Backdoor.Trojan Symantec Trojan.Ysor.32768
Backdoor.Trojan Symantec Trojan.Clickthis
Backdoor.Trojan Symantec BackDoor.Mxl
Backdoor.Trojan Symantec BackDoor.Ckg
Backdoor.Trojan Symantec BackDoor.Ofsong
Backdoor.Trojan Symantec Win32.HLLW.Ghostbot
Backdoor.Trojan Symantec BackDoor.Generic.834
Backdoor.Trojan Symantec BackDoor.Generic.835
Backdoor.Trojan Symantec BackDoor.Mesiha
Backdoor.Trojan Symantec BackDoor.Judas

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.