Library
My library

Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.Inject5.21734 03:01:53 20.04.2025 Show
Trojan.MulDrop31.12819 03:01:53 20.04.2025 Show
Trojan.MulDrop31.12877 03:01:50 20.04.2025 Show
Trojan.MulDrop31.13074 03:01:50 20.04.2025 Show
Trojan.MulDrop31.13030 03:01:49 20.04.2025 Show
Trojan.Gozi.1100 03:01:49 20.04.2025 Show
Trojan.Siggen31.13738 03:01:48 20.04.2025 Show
Trojan.Siggen31.13917 03:01:48 20.04.2025 Show
Trojan.MulDrop31.12858 03:01:48 20.04.2025 Show
Trojan.MulDrop31.12873 03:01:47 20.04.2025 Show
Trojan.MulDrop31.12845 03:01:46 20.04.2025 Show
Trojan.DownLoader48.32740 03:01:46 20.04.2025 Show
Trojan.Siggen31.13895 03:01:46 20.04.2025 Show
Trojan.MulDrop31.12829 03:01:45 20.04.2025 Show
Trojan.MulDrop31.13039 03:01:45 20.04.2025 Show
Trojan.DownLoader48.32746 03:01:45 20.04.2025 Show
Trojan.Siggen31.13936 03:01:45 20.04.2025 Show
Trojan.MulDrop31.12891 03:01:45 20.04.2025 Show
Trojan.Siggen31.13778 03:01:45 20.04.2025 Show
Trojan.MulDrop31.12828 03:01:43 20.04.2025 Show
Trojan.DownLoader48.32768 03:01:43 20.04.2025 Show
Trojan.MulDrop31.12892 03:01:43 20.04.2025 Show
Trojan.MulDrop31.12809 03:01:42 20.04.2025 Show
Trojan.Siggen31.13846 03:01:42 20.04.2025 Show
Trojan.Tofsee.5005 03:01:41 20.04.2025 Show
Trojan.MulDrop31.12981 03:01:41 20.04.2025 Show
Trojan.DownLoader48.32761 03:01:39 20.04.2025 Show
Trojan.MulDrop31.13176 03:01:37 20.04.2025 Show
Trojan.MulDrop31.12812 03:01:37 20.04.2025 Show
Trojan.DownLoader48.32912 03:01:36 20.04.2025 Show
Trojan.MulDrop31.12896 03:01:36 20.04.2025 Show
Trojan.Siggen31.13925 03:01:35 20.04.2025 Show
Trojan.Siggen31.13784 03:01:34 20.04.2025 Show
Trojan.Siggen30.60227 03:01:33 20.04.2025 Show
Trojan.Siggen31.13938 03:01:32 20.04.2025 Show
Trojan.DownLoader48.32743 03:01:32 20.04.2025 Show
Trojan.MulDrop31.12854 03:01:31 20.04.2025 Show
Trojan.Siggen31.14004 03:01:31 20.04.2025 Show
Trojan.Siggen31.13922 03:01:30 20.04.2025 Show
Trojan.Siggen31.13770 03:01:30 20.04.2025 Show
Trojan.MulDrop31.12846 03:01:30 20.04.2025 Show
Trojan.DownLoader48.32751 03:01:30 20.04.2025 Show
Trojan.MulDrop31.12818 03:01:28 20.04.2025 Show
Trojan.Inject5.21740 03:01:28 20.04.2025 Show
Trojan.Inject5.21857 03:01:28 20.04.2025 Show
Trojan.DownLoader48.32777 03:01:27 20.04.2025 Show
Trojan.Siggen31.13755 03:01:27 20.04.2025 Show
Trojan.DownLoader48.32764 03:01:27 20.04.2025 Show
Trojan.MulDrop31.12867 03:01:26 20.04.2025 Show
Trojan.MulDrop31.12857 03:01:25 20.04.2025 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.