Library
My library

Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.Siggen31.5034 03:15:25 01.04.2025 Show
Trojan.MulDrop30.19760 03:15:25 01.04.2025 Show
Trojan.MulDrop30.19364 03:15:25 01.04.2025 Show
Trojan.DownLoader48.23363 03:15:24 01.04.2025 Show
Trojan.MulDrop30.20454 03:15:24 01.04.2025 Show
Trojan.DownLoader48.23358 03:15:22 01.04.2025 Show
Trojan.DownLoader48.23394 03:15:21 01.04.2025 Show
Trojan.Siggen31.5118 03:15:21 01.04.2025 Show
Trojan.DownLoader48.23338 03:15:21 01.04.2025 Show
Trojan.MulDrop30.20590 03:15:20 01.04.2025 Show
Trojan.DownLoader48.23328 03:15:14 01.04.2025 Show
Trojan.DownLoader48.23431 03:15:13 01.04.2025 Show
Trojan.MulDrop30.18810 03:15:13 01.04.2025 Show
Trojan.MulDrop30.19725 03:15:12 01.04.2025 Show
Trojan.DownLoader48.23396 03:15:11 01.04.2025 Show
Trojan.Siggen31.5061 03:15:10 01.04.2025 Show
Trojan.MulDrop30.20456 03:15:09 01.04.2025 Show
Trojan.MulDrop30.20939 03:15:08 01.04.2025 Show
Trojan.Tofsee.2472 03:15:06 01.04.2025 Show
Trojan.Siggen31.5080 03:15:05 01.04.2025 Show
Trojan.Inject5.19945 03:15:05 01.04.2025 Show
Trojan.Tofsee.2462 03:15:04 01.04.2025 Show
Trojan.DownLoader48.23357 03:15:04 01.04.2025 Show
Trojan.MulDrop30.20280 03:15:01 01.04.2025 Show
Trojan.MulDrop30.19130 03:14:59 01.04.2025 Show
Trojan.MulDrop30.20934 03:14:57 01.04.2025 Show
Trojan.DownLoader48.23369 03:14:57 01.04.2025 Show
Trojan.MulDrop30.20617 03:14:56 01.04.2025 Show
Trojan.Siggen31.5123 03:14:55 01.04.2025 Show
Trojan.MulDrop30.19690 03:14:55 01.04.2025 Show
Trojan.MulDrop30.19355 03:14:49 01.04.2025 Show
Trojan.DownLoader48.23289 03:14:49 01.04.2025 Show
Trojan.MulDrop30.20480 03:14:48 01.04.2025 Show
Trojan.MulDrop30.20488 03:14:48 01.04.2025 Show
Trojan.MulDrop30.19639 03:14:48 01.04.2025 Show
Trojan.MulDrop30.18527 03:14:48 01.04.2025 Show
Trojan.Siggen31.5105 03:14:48 01.04.2025 Show
Trojan.MulDrop30.21035 03:14:47 01.04.2025 Show
Trojan.DownLoader48.23591 03:14:42 01.04.2025 Show
Trojan.MulDrop30.20111 03:14:41 01.04.2025 Show
Trojan.MulDrop30.19974 03:14:39 01.04.2025 Show
Trojan.MulDrop30.20937 03:14:38 01.04.2025 Show
Trojan.Siggen31.5040 03:14:35 01.04.2025 Show
Trojan.MulDrop30.22513 03:14:32 01.04.2025 Show
Trojan.Siggen31.5001 03:14:31 01.04.2025 Show
Trojan.KillProc2.24326 03:14:30 01.04.2025 Show
Trojan.MulDrop30.19629 03:14:29 01.04.2025 Show
Trojan.DownLoader48.23345 03:14:29 01.04.2025 Show
Trojan.MulDrop30.20680 03:14:26 01.04.2025 Show
Trojan.MulDrop30.19215 03:14:26 01.04.2025 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.