Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.Click2.57108 03:05:22 18.03.2026 Show
Trojan.Inject6.30162 03:05:22 18.03.2026 Show
Trojan.Siggen32.28945 03:05:22 18.03.2026 Show
Trojan.DownLoader49.36679 03:05:22 18.03.2026 Show
Trojan.MulDrop36.16635 03:05:22 18.03.2026 Show
Trojan.MulDrop36.16875 03:05:21 18.03.2026 Show
Trojan.MulDrop36.17015 03:05:20 18.03.2026 Show
Trojan.MulDrop36.16761 03:05:20 18.03.2026 Show
Trojan.MulDrop36.17142 03:05:19 18.03.2026 Show
Trojan.Inject6.30170 03:05:19 18.03.2026 Show
Trojan.Encoder.44590 03:05:19 18.03.2026 Show
Trojan.MulDrop36.17014 03:05:18 18.03.2026 Show
Trojan.MulDrop36.16725 03:05:18 18.03.2026 Show
Trojan.MulDrop36.16708 03:05:17 18.03.2026 Show
Trojan.Inject6.30212 03:05:17 18.03.2026 Show
Trojan.Siggen32.28859 03:05:17 18.03.2026 Show
Trojan.MulDrop36.16823 03:05:17 18.03.2026 Show
Trojan.MulDrop36.16689 03:05:17 18.03.2026 Show
Trojan.MulDrop36.16822 03:05:17 18.03.2026 Show
Trojan.Inject6.30200 03:05:16 18.03.2026 Show
Trojan.MulDrop36.17048 03:05:16 18.03.2026 Show
Trojan.MulDrop36.16816 03:05:16 18.03.2026 Show
Trojan.MulDrop36.16771 03:05:15 18.03.2026 Show
Trojan.Loader.1713 03:05:14 18.03.2026 Show
Trojan.MulDrop36.16746 03:05:14 18.03.2026 Show
Trojan.Siggen32.28930 03:05:14 18.03.2026 Show
Trojan.Siggen32.28877 03:05:14 18.03.2026 Show
Trojan.Siggen32.28943 03:05:14 18.03.2026 Show
Trojan.MulDrop36.16942 03:05:14 18.03.2026 Show
Trojan.MulDrop36.16742 03:05:13 18.03.2026 Show
Trojan.DownLoader49.36606 03:05:13 18.03.2026 Show
Trojan.Siggen32.28941 03:05:13 18.03.2026 Show
Trojan.MulDrop36.16922 03:05:13 18.03.2026 Show
Trojan.Siggen32.28880 03:05:13 18.03.2026 Show
Trojan.MulDrop36.16702 03:05:13 18.03.2026 Show
Trojan.MulDrop36.17088 03:05:13 18.03.2026 Show
Trojan.DownLoader49.36615 03:05:12 18.03.2026 Show
Trojan.Inject6.30106 03:05:12 18.03.2026 Show
Trojan.MulDrop36.16721 03:05:12 18.03.2026 Show
Trojan.MulDrop36.17044 03:05:12 18.03.2026 Show
Trojan.Siggen32.28899 03:05:12 18.03.2026 Show
Trojan.MulDrop36.16669 03:05:12 18.03.2026 Show
Trojan.MulDrop36.16887 03:05:11 18.03.2026 Show
Trojan.Siggen32.28885 03:05:11 18.03.2026 Show
Trojan.Inject6.30215 03:05:11 18.03.2026 Show
Trojan.MulDrop36.17129 03:05:11 18.03.2026 Show
Trojan.MulDrop36.16879 03:05:11 18.03.2026 Show
Trojan.MulDrop36.17180 03:05:09 18.03.2026 Show
Trojan.MulDrop36.17022 03:05:09 18.03.2026 Show
Trojan.MulDrop36.16999 03:05:09 18.03.2026 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.