Library
My library

Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.Siggen31.5496 03:09:08 03.04.2025 Show
Trojan.MulDrop30.31405 03:09:08 03.04.2025 Show
Trojan.MulDrop30.32310 03:09:07 03.04.2025 Show
Trojan.DownLoader48.23812 03:09:07 03.04.2025 Show
Trojan.DownLoader48.24214 03:09:07 03.04.2025 Show
Trojan.MulDrop30.35772 03:09:05 03.04.2025 Show
Trojan.MulDrop30.37316 03:09:05 03.04.2025 Show
Trojan.MulDrop30.38463 03:09:04 03.04.2025 Show
Trojan.DownLoader48.23898 03:09:04 03.04.2025 Show
Trojan.MulDrop30.38540 03:09:03 03.04.2025 Show
Trojan.MulDrop30.34328 03:09:03 03.04.2025 Show
Trojan.MulDrop30.34385 03:09:03 03.04.2025 Show
Trojan.MulDrop30.35595 03:09:02 03.04.2025 Show
BackDoor.SpyNetRat.61 03:09:02 03.04.2025 Show
Trojan.DownLoader48.23970 03:09:00 03.04.2025 Show
Trojan.MulDrop30.35127 03:09:00 03.04.2025 Show
Trojan.DownLoader48.23892 03:09:00 03.04.2025 Show
Trojan.MulDrop30.32551 03:08:59 03.04.2025 Show
Trojan.DownLoader48.23700 03:08:58 03.04.2025 Show
Trojan.Siggen31.5333 03:08:58 03.04.2025 Show
Trojan.DownLoader48.24033 03:08:57 03.04.2025 Show
Trojan.MulDrop30.30657 03:08:57 03.04.2025 Show
Trojan.Siggen31.5417 03:08:57 03.04.2025 Show
Trojan.MulDrop30.35679 03:08:57 03.04.2025 Show
Trojan.DownLoader48.24040 03:08:57 03.04.2025 Show
Trojan.DownLoader48.24311 03:08:57 03.04.2025 Show
Trojan.MulDrop30.34387 03:08:56 03.04.2025 Show
Trojan.MulDrop30.32497 03:08:55 03.04.2025 Show
Trojan.MulDrop30.34757 03:08:55 03.04.2025 Show
Trojan.MulDrop30.38657 03:08:54 03.04.2025 Show
Trojan.DownLoader48.24017 03:08:54 03.04.2025 Show
Trojan.DownLoader48.23838 03:08:53 03.04.2025 Show
Trojan.MulDrop30.33452 03:08:53 03.04.2025 Show
Trojan.MulDrop30.37071 03:08:52 03.04.2025 Show
Trojan.MulDrop30.34033 03:08:51 03.04.2025 Show
Trojan.MulDrop30.34636 03:08:51 03.04.2025 Show
Trojan.DownLoader48.24030 03:08:50 03.04.2025 Show
Trojan.MulDrop30.33323 03:08:50 03.04.2025 Show
Trojan.MulDrop30.38517 03:08:49 03.04.2025 Show
Trojan.MulDrop30.38972 03:08:48 03.04.2025 Show
Trojan.Siggen31.5357 03:08:48 03.04.2025 Show
Trojan.MulDrop30.31059 03:08:47 03.04.2025 Show
Trojan.MulDrop30.37215 03:08:47 03.04.2025 Show
Trojan.MulDrop30.33745 03:08:46 03.04.2025 Show
Trojan.DownLoader48.23879 03:08:46 03.04.2025 Show
Trojan.MulDrop30.33543 03:08:45 03.04.2025 Show
Trojan.DownLoader48.23957 03:08:44 03.04.2025 Show
Trojan.MulDrop30.38680 03:08:44 03.04.2025 Show
Trojan.DownLoader48.23728 03:08:44 03.04.2025 Show
Trojan.MulDrop30.34171 03:08:43 03.04.2025 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.