Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Android.BankBot.Coper.6425 14:17:59 03.12.2024 Show
Android.Hidden.12161 13:44:30 03.12.2024 Show
Android.BankBot.15224 05:28:41 03.12.2024 Show
Trojan.DownLoader47.55348 03:01:15 03.12.2024 Show
Trojan.Siggen30.15072 03:01:14 03.12.2024 Show
Trojan.Siggen30.15517 03:01:14 03.12.2024 Show
Trojan.Siggen30.15018 03:01:14 03.12.2024 Show
Trojan.Siggen30.15589 03:01:14 03.12.2024 Show
Trojan.Siggen30.15468 03:01:14 03.12.2024 Show
Trojan.Siggen30.15276 03:01:14 03.12.2024 Show
Trojan.Siggen30.15435 03:01:14 03.12.2024 Show
Trojan.Siggen30.14991 03:01:14 03.12.2024 Show
Trojan.MulDrop28.47592 03:01:14 03.12.2024 Show
Trojan.MulDrop28.47538 03:01:14 03.12.2024 Show
Trojan.DownLoader47.55372 03:01:13 03.12.2024 Show
Trojan.MulDrop28.47629 03:01:13 03.12.2024 Show
Trojan.Siggen30.14965 03:01:13 03.12.2024 Show
Trojan.Siggen30.15586 03:01:13 03.12.2024 Show
Trojan.DownLoader47.55340 03:01:13 03.12.2024 Show
Trojan.Siggen30.15729 03:01:13 03.12.2024 Show
Trojan.Siggen30.15315 03:01:13 03.12.2024 Show
Trojan.MulDrop28.47681 03:01:13 03.12.2024 Show
Trojan.DownLoader47.55224 03:01:13 03.12.2024 Show
Trojan.MulDrop28.47672 03:01:13 03.12.2024 Show
Trojan.DownLoader47.55401 03:01:13 03.12.2024 Show
Trojan.Siggen30.15296 03:01:13 03.12.2024 Show
Trojan.Siggen30.15442 03:01:13 03.12.2024 Show
Trojan.Siggen30.15127 03:01:13 03.12.2024 Show
Trojan.MulDrop28.47633 03:01:13 03.12.2024 Show
Trojan.Siggen30.15609 03:01:13 03.12.2024 Show
Trojan.Siggen30.15199 03:01:13 03.12.2024 Show
Trojan.Siggen30.15211 03:01:13 03.12.2024 Show
JS.Muldrop.984 03:01:13 03.12.2024 Show
Trojan.Siggen30.14947 03:01:13 03.12.2024 Show
Trojan.Siggen30.15614 03:01:13 03.12.2024 Show
Trojan.MulDrop28.47707 03:01:13 03.12.2024 Show
Trojan.DownLoader47.55384 03:01:12 03.12.2024 Show
Trojan.Siggen30.15564 03:01:12 03.12.2024 Show
Trojan.DownLoader47.55250 03:01:12 03.12.2024 Show
Trojan.Siggen30.15196 03:01:12 03.12.2024 Show
Trojan.MulDrop28.47539 03:01:12 03.12.2024 Show
Trojan.DownLoader47.55407 03:01:12 03.12.2024 Show
Trojan.Inject5.12869 03:01:12 03.12.2024 Show
Trojan.Siggen30.15221 03:01:12 03.12.2024 Show
Trojan.Siggen30.15361 03:01:12 03.12.2024 Show
Trojan.Siggen30.15488 03:01:12 03.12.2024 Show
Trojan.Siggen30.15025 03:01:12 03.12.2024 Show
Trojan.DownLoader47.55377 03:01:12 03.12.2024 Show
Trojan.Siggen30.15112 03:01:12 03.12.2024 Show
Trojan.DownLoader47.55216 03:01:12 03.12.2024 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.