Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.MulDrop34.14153 03:06:39 05.12.2025 Show
Trojan.PWS.Siggen4.11578 03:06:39 05.12.2025 Show
Trojan.MulDrop34.15154 03:06:39 05.12.2025 Show
Trojan.PWS.Siggen4.12034 03:06:38 05.12.2025 Show
Trojan.MulDrop34.14776 03:06:38 05.12.2025 Show
Trojan.PWS.Siggen4.12415 03:06:38 05.12.2025 Show
Trojan.Siggen32.11327 03:06:38 05.12.2025 Show
Trojan.MulDrop34.14235 03:06:37 05.12.2025 Show
Trojan.PWS.Siggen4.11391 03:06:37 05.12.2025 Show
Trojan.PWS.Siggen4.12531 03:06:37 05.12.2025 Show
Trojan.MulDrop34.14754 03:06:37 05.12.2025 Show
Trojan.DownLoader49.16865 03:06:37 05.12.2025 Show
Trojan.MulDrop34.14868 03:06:37 05.12.2025 Show
Trojan.Siggen32.11364 03:06:36 05.12.2025 Show
Trojan.MulDrop34.13945 03:06:36 05.12.2025 Show
Trojan.MulDrop34.14657 03:06:36 05.12.2025 Show
Trojan.PWS.Siggen4.11990 03:06:36 05.12.2025 Show
Trojan.MulDrop34.13868 03:06:36 05.12.2025 Show
Trojan.PWS.Siggen4.11608 03:06:36 05.12.2025 Show
Trojan.MulDrop34.13986 03:06:36 05.12.2025 Show
Trojan.MulDrop34.14804 03:06:36 05.12.2025 Show
Trojan.MulDrop34.13904 03:06:36 05.12.2025 Show
Trojan.PWS.Siggen4.11971 03:06:36 05.12.2025 Show
Trojan.DownLoader49.16836 03:06:36 05.12.2025 Show
Trojan.PWS.Siggen4.13115 03:06:36 05.12.2025 Show
Trojan.PWS.Siggen4.11439 03:06:35 05.12.2025 Show
Trojan.KillFiles2.4968 03:06:35 05.12.2025 Show
Trojan.MulDrop34.14367 03:06:35 05.12.2025 Show
Trojan.MulDrop34.14461 03:06:35 05.12.2025 Show
Trojan.MulDrop34.14403 03:06:35 05.12.2025 Show
Trojan.PWS.Siggen4.12232 03:06:35 05.12.2025 Show
Trojan.MulDrop34.14102 03:06:35 05.12.2025 Show
Trojan.PWS.Siggen4.11397 03:06:35 05.12.2025 Show
Trojan.MulDrop34.13884 03:06:34 05.12.2025 Show
Trojan.PWS.Siggen4.12487 03:06:34 05.12.2025 Show
Trojan.PWS.Siggen4.12297 03:06:34 05.12.2025 Show
Trojan.PWS.Siggen4.11643 03:06:34 05.12.2025 Show
Trojan.MulDrop34.14009 03:06:34 05.12.2025 Show
Trojan.MulDrop34.14398 03:06:34 05.12.2025 Show
Trojan.PWS.Siggen4.11728 03:06:34 05.12.2025 Show
Trojan.PWS.Siggen4.12088 03:06:34 05.12.2025 Show
Trojan.PWS.Siggen4.11374 03:06:33 05.12.2025 Show
Trojan.PWS.Siggen4.12052 03:06:33 05.12.2025 Show
Trojan.MulDrop34.14459 03:06:33 05.12.2025 Show
Trojan.MulDrop34.14583 03:06:33 05.12.2025 Show
Trojan.Siggen32.11216 03:06:33 05.12.2025 Show
Trojan.MulDrop34.14410 03:06:33 05.12.2025 Show
Trojan.PWS.Siggen4.11559 03:06:32 05.12.2025 Show
Trojan.MulDrop34.14143 03:06:32 05.12.2025 Show
Trojan.KillFiles2.4940 03:06:32 05.12.2025 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.