Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.PWS.Siggen4.11869 03:03:54 05.12.2025 Show
Trojan.MulDrop34.14570 03:03:54 05.12.2025 Show
Trojan.PWS.Siggen4.11927 03:03:54 05.12.2025 Show
Trojan.MulDrop34.15347 03:03:54 05.12.2025 Show
Trojan.MulDrop34.13973 03:03:53 05.12.2025 Show
Trojan.Inject6.18333 03:03:53 05.12.2025 Show
Trojan.PWS.Siggen4.11617 03:03:53 05.12.2025 Show
Trojan.PWS.Siggen4.11465 03:03:52 05.12.2025 Show
Trojan.PWS.Siggen4.12474 03:03:52 05.12.2025 Show
Trojan.PWS.Siggen4.11386 03:03:52 05.12.2025 Show
Trojan.PWS.Siggen4.11774 03:03:52 05.12.2025 Show
Trojan.Siggen32.11252 03:03:52 05.12.2025 Show
Trojan.PWS.Siggen4.12102 03:03:52 05.12.2025 Show
Trojan.PWS.Siggen4.13345 03:03:52 05.12.2025 Show
Trojan.PWS.Siggen4.11537 03:03:51 05.12.2025 Show
Trojan.MulDrop34.14438 03:03:51 05.12.2025 Show
Trojan.PWS.Siggen4.12156 03:03:51 05.12.2025 Show
Trojan.MulDrop34.14113 03:03:51 05.12.2025 Show
Trojan.PWS.Siggen4.11509 03:03:51 05.12.2025 Show
Trojan.PWS.Siggen4.11758 03:03:51 05.12.2025 Show
Trojan.MulDrop34.14468 03:03:51 05.12.2025 Show
Trojan.Siggen32.11291 03:03:51 05.12.2025 Show
Trojan.MulDrop34.14551 03:03:51 05.12.2025 Show
Trojan.PWS.Siggen4.12351 03:03:51 05.12.2025 Show
Trojan.PWS.Siggen4.11543 03:03:51 05.12.2025 Show
Trojan.PWS.Siggen4.11365 03:03:50 05.12.2025 Show
Trojan.PWS.Siggen4.12774 03:03:50 05.12.2025 Show
Trojan.MulDrop34.14308 03:03:50 05.12.2025 Show
Trojan.MulDrop34.14758 03:03:49 05.12.2025 Show
Trojan.PWS.Siggen4.11364 03:03:49 05.12.2025 Show
Trojan.PWS.Siggen4.11487 03:03:49 05.12.2025 Show
Trojan.MulDrop34.14723 03:03:49 05.12.2025 Show
Trojan.PWS.Siggen4.12026 03:03:49 05.12.2025 Show
Trojan.Tofsee.6756 03:03:49 05.12.2025 Show
Trojan.MulDrop34.14025 03:03:49 05.12.2025 Show
Trojan.PWS.Siggen4.12360 03:03:49 05.12.2025 Show
Trojan.PWS.Siggen4.12074 03:03:49 05.12.2025 Show
Trojan.PWS.Siggen4.12406 03:03:49 05.12.2025 Show
Trojan.PWS.Siggen4.11988 03:03:49 05.12.2025 Show
Trojan.MulDrop34.14212 03:03:48 05.12.2025 Show
Trojan.MulDrop34.14736 03:03:48 05.12.2025 Show
Trojan.MulDrop34.14049 03:03:48 05.12.2025 Show
Trojan.MulDrop34.14220 03:03:48 05.12.2025 Show
Trojan.PWS.Siggen4.12155 03:03:48 05.12.2025 Show
Trojan.PWS.Siggen4.11587 03:03:48 05.12.2025 Show
Trojan.MulDrop34.14624 03:03:48 05.12.2025 Show
Trojan.PWS.Siggen4.12289 03:03:48 05.12.2025 Show
Trojan.PWS.Siggen4.12059 03:03:47 05.12.2025 Show
Trojan.MulDrop34.14255 03:03:47 05.12.2025 Show
Trojan.PWS.Siggen4.11867 03:03:47 05.12.2025 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.