Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Android.RemoteCode.8561 13:20:49 16.11.2025 Show
Android.MobiDash.8520 07:46:37 16.11.2025 Show
Android.MulDrop.1453 07:19:58 15.11.2025 Show
Android.MobiDash.8519 06:27:00 16.11.2025 Show
Android.MulDrop.1454 06:19:03 16.11.2025 Show
Android.MobiDash.8518 05:37:56 15.11.2025 Show
Android.MobiDash.8517 05:33:23 15.11.2025 Show
Android.BankBot.15820 05:23:20 15.11.2025 Show
Android.BankBot.Coper.7429 05:23:12 15.11.2025 Show
Android.BankBot.Coper.7428 05:19:16 15.11.2025 Show
Android.MobiDash.8522 05:07:47 16.11.2025 Show
Android.MobiDash.8521 05:03:36 16.11.2025 Show
Trojan.Tofsee.6456 03:11:05 16.11.2025 Show
Trojan.MulDrop33.57616 03:11:04 16.11.2025 Show
Trojan.Siggen32.7994 03:11:04 16.11.2025 Show
Trojan.Inject6.15731 03:11:04 16.11.2025 Show
Trojan.MulDrop33.55773 03:11:04 16.11.2025 Show
Trojan.DownLoader49.13747 03:11:03 16.11.2025 Show
Trojan.MulDrop33.57130 03:11:03 16.11.2025 Show
Trojan.MulDrop33.56853 03:11:03 16.11.2025 Show
Trojan.MulDrop33.55599 03:11:03 16.11.2025 Show
Trojan.MulDrop33.57538 03:11:02 16.11.2025 Show
Trojan.MulDrop33.56834 03:11:02 16.11.2025 Show
Trojan.MulDrop33.57062 03:11:02 16.11.2025 Show
Trojan.MulDrop33.55646 03:11:02 16.11.2025 Show
Trojan.MulDrop33.55530 03:11:02 16.11.2025 Show
Trojan.DownLoader49.13569 03:11:02 16.11.2025 Show
Trojan.Inject6.15580 03:11:02 16.11.2025 Show
Trojan.Inject6.15727 03:11:01 16.11.2025 Show
Trojan.MulDrop33.57658 03:11:01 16.11.2025 Show
Trojan.MulDrop33.56914 03:11:01 16.11.2025 Show
Trojan.MulDrop33.55850 03:11:01 16.11.2025 Show
Trojan.MulDrop33.57121 03:11:01 16.11.2025 Show
Trojan.MulDrop33.57151 03:11:01 16.11.2025 Show
Trojan.Inject6.15740 03:11:01 16.11.2025 Show
Trojan.Packed2.50556 03:11:01 16.11.2025 Show
Trojan.MulDrop33.57448 03:11:00 16.11.2025 Show
Trojan.MulDrop33.57202 03:11:00 16.11.2025 Show
Trojan.Inject6.15755 03:10:59 16.11.2025 Show
Trojan.MulDrop33.59648 03:10:59 16.11.2025 Show
Trojan.MulDrop33.55675 03:10:59 16.11.2025 Show
Trojan.MulDrop33.57293 03:10:59 16.11.2025 Show
Trojan.MulDrop33.57470 03:10:58 16.11.2025 Show
Trojan.MulDrop33.57126 03:10:58 16.11.2025 Show
Trojan.MulDrop33.56812 03:10:58 16.11.2025 Show
Win32.HLLW.Phorpiex.1608 03:10:58 16.11.2025 Show
Trojan.MulDrop33.56782 03:10:58 16.11.2025 Show
Trojan.MulDrop33.55388 03:10:58 16.11.2025 Show
Trojan.MulDrop33.57625 03:10:58 16.11.2025 Show
Trojan.MulDrop33.57382 03:10:58 16.11.2025 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.