Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.Inject6.18296 03:07:14 05.12.2025 Show
Trojan.DownLoader49.16739 03:07:14 05.12.2025 Show
Trojan.PWS.Siggen4.12401 03:07:14 05.12.2025 Show
Trojan.DownLoader49.16779 03:07:14 05.12.2025 Show
Trojan.Siggen32.11337 03:07:13 05.12.2025 Show
Trojan.PWS.Siggen4.11826 03:07:13 05.12.2025 Show
Trojan.PWS.Siggen4.11938 03:07:13 05.12.2025 Show
Trojan.MulDrop34.14165 03:07:13 05.12.2025 Show
Trojan.PWS.Siggen4.11260 03:07:12 05.12.2025 Show
Trojan.PWS.Siggen4.12526 03:07:12 05.12.2025 Show
Trojan.PWS.Siggen4.11868 03:07:12 05.12.2025 Show
Trojan.PWS.Siggen4.12434 03:07:12 05.12.2025 Show
Trojan.Siggen32.11391 03:07:12 05.12.2025 Show
Trojan.MulDrop34.13738 03:07:12 05.12.2025 Show
Trojan.Siggen32.11244 03:07:12 05.12.2025 Show
Trojan.MulDrop34.14405 03:07:12 05.12.2025 Show
Trojan.MulDrop34.14825 03:07:11 05.12.2025 Show
Trojan.MulDrop34.14239 03:07:11 05.12.2025 Show
Trojan.PWS.Siggen4.11725 03:07:11 05.12.2025 Show
Trojan.MulDrop34.14137 03:07:11 05.12.2025 Show
Trojan.PWS.Siggen4.11942 03:07:11 05.12.2025 Show
Trojan.MulDrop34.14450 03:07:11 05.12.2025 Show
BackDoor.Broomstick.6 03:07:11 05.12.2025 Show
Trojan.DownLoader49.16767 03:07:11 05.12.2025 Show
Trojan.MulDrop34.14202 03:07:11 05.12.2025 Show
Trojan.Inject6.18285 03:07:10 05.12.2025 Show
Trojan.KillFiles2.4932 03:07:10 05.12.2025 Show
Trojan.MulDrop34.14699 03:07:10 05.12.2025 Show
Trojan.MulDrop34.14326 03:07:10 05.12.2025 Show
Trojan.MulDrop34.15018 03:07:10 05.12.2025 Show
Trojan.PWS.Siggen4.11360 03:07:10 05.12.2025 Show
Trojan.MulDrop34.14350 03:07:10 05.12.2025 Show
Trojan.MulDrop34.14592 03:07:09 05.12.2025 Show
Trojan.Siggen32.11338 03:07:09 05.12.2025 Show
Trojan.MulDrop34.14030 03:07:09 05.12.2025 Show
Trojan.BankBot.2313 03:07:09 05.12.2025 Show
Trojan.PWS.Siggen4.12313 03:07:09 05.12.2025 Show
Trojan.PWS.Siggen4.12076 03:07:09 05.12.2025 Show
Trojan.PWS.Siggen4.11548 03:07:09 05.12.2025 Show
Trojan.MulDrop34.14344 03:07:08 05.12.2025 Show
Trojan.PWS.Siggen4.11974 03:07:08 05.12.2025 Show
Trojan.PWS.Siggen4.11452 03:07:08 05.12.2025 Show
Trojan.DownLoader49.16759 03:07:08 05.12.2025 Show
Trojan.MulDrop34.14831 03:07:07 05.12.2025 Show
Trojan.PWS.Siggen4.12072 03:07:07 05.12.2025 Show
Trojan.MulDrop34.14706 03:07:07 05.12.2025 Show
Trojan.PWS.Siggen4.12205 03:07:07 05.12.2025 Show
Trojan.PWS.Siggen4.12292 03:07:06 05.12.2025 Show
Trojan.PWS.Siggen4.13112 03:07:06 05.12.2025 Show
Trojan.MulDrop34.13836 03:07:06 05.12.2025 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.