Library
My library

Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.Siggen31.5701 03:10:42 03.04.2025 Show
Trojan.MulDrop30.37658 03:10:42 03.04.2025 Show
Trojan.Siggen31.5537 03:10:42 03.04.2025 Show
Trojan.MulDrop30.33494 03:10:40 03.04.2025 Show
Trojan.DownLoader48.23815 03:10:40 03.04.2025 Show
Trojan.MulDrop30.34337 03:10:39 03.04.2025 Show
Trojan.MulDrop30.34720 03:10:39 03.04.2025 Show
Trojan.Siggen31.5591 03:10:39 03.04.2025 Show
Trojan.Siggen31.5505 03:10:39 03.04.2025 Show
Trojan.Siggen31.5464 03:10:38 03.04.2025 Show
Trojan.MulDrop30.35435 03:10:37 03.04.2025 Show
Trojan.MulDrop30.33686 03:10:37 03.04.2025 Show
Trojan.DownLoader48.23999 03:10:36 03.04.2025 Show
Trojan.Siggen31.5495 03:10:36 03.04.2025 Show
Trojan.MulDrop30.34099 03:10:36 03.04.2025 Show
Trojan.DownLoader48.24286 03:10:36 03.04.2025 Show
Trojan.MulDrop30.34971 03:10:35 03.04.2025 Show
Trojan.PWS.Panda.14239 03:10:34 03.04.2025 Show
Trojan.MulDrop30.37725 03:10:34 03.04.2025 Show
Trojan.MulDrop30.34009 03:10:34 03.04.2025 Show
Trojan.MulDrop30.33903 03:10:34 03.04.2025 Show
Trojan.MulDrop30.33685 03:10:34 03.04.2025 Show
Trojan.MulDrop30.32308 03:10:34 03.04.2025 Show
Trojan.MulDrop30.31337 03:10:33 03.04.2025 Show
Trojan.DownLoader48.23766 03:10:33 03.04.2025 Show
Trojan.Bladabindi.1318 03:10:32 03.04.2025 Show
Trojan.DownLoader48.24104 03:10:31 03.04.2025 Show
Trojan.MulDrop30.38529 03:10:31 03.04.2025 Show
Trojan.MulDrop30.37283 03:10:31 03.04.2025 Show
Trojan.DownLoader48.23967 03:10:31 03.04.2025 Show
Trojan.DownLoader48.23932 03:10:30 03.04.2025 Show
Trojan.DownLoader48.23741 03:10:30 03.04.2025 Show
Trojan.Siggen31.5669 03:10:30 03.04.2025 Show
Trojan.DownLoader48.23924 03:10:30 03.04.2025 Show
Trojan.DownLoader48.23996 03:10:29 03.04.2025 Show
Trojan.Siggen31.5514 03:10:29 03.04.2025 Show
Trojan.MulDrop30.31825 03:10:28 03.04.2025 Show
Trojan.MulDrop30.33425 03:10:28 03.04.2025 Show
Trojan.DownLoader48.23810 03:10:28 03.04.2025 Show
Trojan.DownLoader48.23802 03:10:28 03.04.2025 Show
Trojan.MulDrop30.37448 03:10:28 03.04.2025 Show
Trojan.MulDrop30.30759 03:10:27 03.04.2025 Show
Trojan.MulDrop30.31566 03:10:26 03.04.2025 Show
Trojan.DownLoader48.23846 03:10:26 03.04.2025 Show
Exploit.Siggen3.51115 03:10:26 03.04.2025 Show
Trojan.MulDrop30.34511 03:10:25 03.04.2025 Show
Trojan.MulDrop30.35717 03:10:25 03.04.2025 Show
Trojan.MulDrop30.34622 03:10:24 03.04.2025 Show
Trojan.MulDrop30.33438 03:10:23 03.04.2025 Show
Trojan.MulDrop30.34019 03:10:23 03.04.2025 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.