Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.MulDrop30.7124 03:14:40 28.03.2025 Show
Trojan.MulDrop30.6621 03:14:40 28.03.2025 Show
Trojan.MulDrop30.8216 03:14:38 28.03.2025 Show
Trojan.Inject5.19806 03:14:37 28.03.2025 Show
Trojan.MulDrop30.1792 03:14:35 28.03.2025 Show
Trojan.Siggen31.4534 03:14:34 28.03.2025 Show
Trojan.MulDrop30.6625 03:14:33 28.03.2025 Show
Trojan.MulDrop30.8195 03:14:33 28.03.2025 Show
Trojan.MulDrop30.1071 03:14:33 28.03.2025 Show
Trojan.Siggen31.4317 03:14:33 28.03.2025 Show
Trojan.MulDrop30.1411 03:14:32 28.03.2025 Show
Trojan.MulDrop30.1933 03:14:32 28.03.2025 Show
Trojan.MulDrop30.8105 03:14:31 28.03.2025 Show
Trojan.DownLoader48.22438 03:14:31 28.03.2025 Show
Trojan.MulDrop30.1616 03:14:30 28.03.2025 Show
Trojan.MulDrop30.8295 03:14:28 28.03.2025 Show
Trojan.MulDrop30.1814 03:14:27 28.03.2025 Show
Trojan.MulDrop30.1707 03:14:27 28.03.2025 Show
Trojan.MulDrop30.1629 03:14:27 28.03.2025 Show
Trojan.DownLoader48.22521 03:14:26 28.03.2025 Show
Trojan.DownLoader48.22586 03:14:26 28.03.2025 Show
Trojan.MulDrop30.1203 03:14:26 28.03.2025 Show
Trojan.Bladabindi.1283 03:14:24 28.03.2025 Show
Trojan.MulDrop30.1586 03:14:24 28.03.2025 Show
Trojan.MulDrop30.3479 03:14:24 28.03.2025 Show
Trojan.MulDrop30.1602 03:14:23 28.03.2025 Show
Trojan.DownLoader48.22717 03:14:23 28.03.2025 Show
Trojan.DownLoader48.22541 03:14:22 28.03.2025 Show
Trojan.MulDrop30.1657 03:14:22 28.03.2025 Show
Trojan.MulDrop30.1811 03:14:21 28.03.2025 Show
Trojan.MulDrop30.1928 03:14:21 28.03.2025 Show
Trojan.MulDrop30.4758 03:14:20 28.03.2025 Show
Trojan.MulDrop30.3801 03:14:20 28.03.2025 Show
Trojan.MulDrop30.2002 03:14:19 28.03.2025 Show
Trojan.MulDrop30.2306 03:14:19 28.03.2025 Show
Trojan.MulDrop30.1435 03:14:18 28.03.2025 Show
Trojan.MulDrop30.1594 03:14:17 28.03.2025 Show
Trojan.DownLoader48.22421 03:14:16 28.03.2025 Show
Trojan.MulDrop30.1876 03:14:16 28.03.2025 Show
Trojan.MulDrop30.8372 03:14:16 28.03.2025 Show
Trojan.Siggen31.4539 03:14:15 28.03.2025 Show
Trojan.MulDrop30.1982 03:14:14 28.03.2025 Show
Trojan.Siggen31.4487 03:14:14 28.03.2025 Show
Trojan.MulDrop30.3020 03:14:13 28.03.2025 Show
Trojan.MulDrop30.8230 03:14:13 28.03.2025 Show
Trojan.Inject5.19736 03:14:13 28.03.2025 Show
Trojan.MulDrop30.8366 03:14:12 28.03.2025 Show
Trojan.DownLoader48.22548 03:14:12 28.03.2025 Show
Trojan.MulDrop30.1313 03:14:11 28.03.2025 Show
Trojan.MulDrop30.2146 03:14:11 28.03.2025 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.