Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.DownLoader48.3871 03:00:51 18.01.2025 Show
Trojan.DownLoader48.3870 03:00:51 18.01.2025 Show
Trojan.MulDrop28.64523 03:00:51 18.01.2025 Show
Trojan.MulDrop28.64692 03:00:51 18.01.2025 Show
Trojan.Siggen30.50934 03:00:51 18.01.2025 Show
Trojan.MulDrop28.64456 03:00:51 18.01.2025 Show
Trojan.DownLoader48.3967 03:00:51 18.01.2025 Show
Trojan.Siggen30.51159 03:00:50 18.01.2025 Show
Trojan.Siggen30.50959 03:00:50 18.01.2025 Show
Trojan.MulDrop28.64506 03:00:50 18.01.2025 Show
Trojan.MulDrop28.64503 03:00:50 18.01.2025 Show
Trojan.MulDrop28.64634 03:00:49 18.01.2025 Show
Trojan.Siggen30.50834 03:00:49 18.01.2025 Show
Trojan.PWS.Siggen3.39366 03:00:49 18.01.2025 Show
Trojan.MulDrop28.64465 03:00:49 18.01.2025 Show
Trojan.Siggen30.51061 03:00:49 18.01.2025 Show
Trojan.Siggen30.51053 03:00:49 18.01.2025 Show
Trojan.DownLoader48.3953 03:00:49 18.01.2025 Show
Trojan.Siggen30.51163 03:00:48 18.01.2025 Show
Trojan.DownLoader48.3941 03:00:48 18.01.2025 Show
Trojan.Siggen30.50903 03:00:48 18.01.2025 Show
Trojan.Siggen30.51029 03:00:48 18.01.2025 Show
Trojan.MulDrop28.64505 03:00:48 18.01.2025 Show
Trojan.Siggen30.50970 03:00:48 18.01.2025 Show
Trojan.Siggen30.51499 03:00:48 18.01.2025 Show
Trojan.MulDrop28.64527 03:00:48 18.01.2025 Show
Trojan.MulDrop28.64575 03:00:48 18.01.2025 Show
Trojan.DownLoader48.3917 03:00:48 18.01.2025 Show
Trojan.MulDrop28.64719 03:00:48 18.01.2025 Show
Trojan.Siggen30.51097 03:00:48 18.01.2025 Show
Trojan.Siggen30.51084 03:00:48 18.01.2025 Show
Trojan.MulDrop28.64480 03:00:48 18.01.2025 Show
Trojan.DownLoader48.3806 03:00:47 18.01.2025 Show
Trojan.Siggen30.51028 03:00:47 18.01.2025 Show
Trojan.Siggen30.50969 03:00:47 18.01.2025 Show
Trojan.MulDrop28.64461 03:00:47 18.01.2025 Show
Trojan.Siggen30.50932 03:00:47 18.01.2025 Show
Trojan.MulDrop28.64717 03:00:47 18.01.2025 Show
Trojan.DownLoader48.3837 03:00:47 18.01.2025 Show
Trojan.Siggen30.51083 03:00:47 18.01.2025 Show
Trojan.MulDrop28.64479 03:00:47 18.01.2025 Show
Trojan.Siggen30.50876 03:00:47 18.01.2025 Show
Trojan.MulDrop28.64582 03:00:47 18.01.2025 Show
Trojan.DownLoader48.3879 03:00:47 18.01.2025 Show
Trojan.Siggen30.50860 03:00:47 18.01.2025 Show
Trojan.MulDrop28.64705 03:00:46 18.01.2025 Show
Trojan.MulDrop28.64731 03:00:46 18.01.2025 Show
Trojan.Siggen30.50885 03:00:46 18.01.2025 Show
Trojan.MulDrop28.64684 03:00:46 18.01.2025 Show
Trojan.DownLoader48.3874 03:00:46 18.01.2025 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.