Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.MulDrop34.13971 03:08:32 05.12.2025 Show
Trojan.PWS.Siggen4.11271 03:08:32 05.12.2025 Show
Trojan.MulDrop34.13970 03:08:32 05.12.2025 Show
Trojan.PWS.Siggen4.11984 03:08:32 05.12.2025 Show
Trojan.DownLoader49.16844 03:08:32 05.12.2025 Show
Trojan.MulDrop34.15353 03:08:31 05.12.2025 Show
Trojan.PWS.Siggen4.11486 03:08:31 05.12.2025 Show
Trojan.DownLoader49.16883 03:08:31 05.12.2025 Show
Trojan.MulDrop34.14033 03:08:31 05.12.2025 Show
Trojan.PWS.Siggen4.12587 03:08:31 05.12.2025 Show
Trojan.MulDrop34.13890 03:08:30 05.12.2025 Show
Trojan.PWS.Siggen4.11675 03:08:30 05.12.2025 Show
Trojan.MulDrop34.15346 03:08:30 05.12.2025 Show
Trojan.PWS.Siggen4.12449 03:08:29 05.12.2025 Show
Trojan.PWS.Siggen4.11999 03:08:29 05.12.2025 Show
Trojan.PWS.Siggen4.11491 03:08:29 05.12.2025 Show
Trojan.PWS.Siggen4.11830 03:08:29 05.12.2025 Show
Trojan.MulDrop34.13906 03:08:28 05.12.2025 Show
Trojan.PWS.Siggen4.11921 03:08:28 05.12.2025 Show
Trojan.PWS.Siggen4.11603 03:08:28 05.12.2025 Show
Trojan.PWS.Siggen4.11796 03:08:28 05.12.2025 Show
Trojan.PWS.Siggen4.12223 03:08:27 05.12.2025 Show
Trojan.MulDrop34.14593 03:08:27 05.12.2025 Show
Trojan.PWS.Siggen4.12037 03:08:27 05.12.2025 Show
Trojan.PWS.Siggen4.12104 03:08:27 05.12.2025 Show
Trojan.MulDrop34.14425 03:08:27 05.12.2025 Show
Trojan.MulDrop34.14809 03:08:27 05.12.2025 Show
Trojan.MulDrop34.14349 03:08:27 05.12.2025 Show
Trojan.MulDrop34.14278 03:08:26 05.12.2025 Show
Trojan.MulDrop34.14427 03:08:26 05.12.2025 Show
Trojan.PWS.Siggen4.12320 03:08:26 05.12.2025 Show
Trojan.Siggen32.11486 03:08:26 05.12.2025 Show
Trojan.MulDrop34.14859 03:08:26 05.12.2025 Show
Trojan.PWS.Siggen4.12198 03:08:26 05.12.2025 Show
Trojan.Siggen32.11336 03:08:26 05.12.2025 Show
Trojan.MulDrop34.14789 03:08:26 05.12.2025 Show
Trojan.DownLoader49.16756 03:08:26 05.12.2025 Show
Trojan.PWS.Siggen4.11667 03:08:25 05.12.2025 Show
Trojan.MulDrop34.14523 03:08:25 05.12.2025 Show
Trojan.MulDrop34.14335 03:08:25 05.12.2025 Show
Trojan.PWS.Siggen4.12166 03:08:25 05.12.2025 Show
Trojan.Inject6.18266 03:08:25 05.12.2025 Show
Trojan.MulDrop34.14830 03:08:24 05.12.2025 Show
Trojan.MulDrop34.14621 03:08:24 05.12.2025 Show
Trojan.MulDrop34.14413 03:08:24 05.12.2025 Show
Trojan.MulDrop34.14027 03:08:24 05.12.2025 Show
Trojan.PWS.Siggen4.12170 03:08:24 05.12.2025 Show
Trojan.DownLoader49.16765 03:08:24 05.12.2025 Show
Trojan.PWS.Siggen4.12143 03:08:24 05.12.2025 Show
Trojan.PWS.Siggen4.11973 03:08:23 05.12.2025 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.