Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.PWS.Siggen4.12416 03:07:38 05.12.2025 Show
Trojan.PWS.Siggen4.11707 03:07:38 05.12.2025 Show
Trojan.Inject6.18311 03:07:38 05.12.2025 Show
Trojan.PWS.Siggen4.12511 03:07:38 05.12.2025 Show
Trojan.Siggen32.11384 03:07:38 05.12.2025 Show
Trojan.PWS.Siggen4.12230 03:07:37 05.12.2025 Show
Trojan.DownLoader49.16775 03:07:37 05.12.2025 Show
Trojan.PWS.Siggen4.11860 03:07:36 05.12.2025 Show
Trojan.MulDrop34.14103 03:07:36 05.12.2025 Show
Trojan.MulDrop34.14585 03:07:36 05.12.2025 Show
Trojan.MulDrop34.14692 03:07:36 05.12.2025 Show
Trojan.MulDrop34.14056 03:07:36 05.12.2025 Show
Trojan.PWS.Siggen4.11684 03:07:36 05.12.2025 Show
Trojan.PWS.Siggen4.11665 03:07:36 05.12.2025 Show
Trojan.MulDrop34.14091 03:07:36 05.12.2025 Show
Trojan.PWS.Siggen4.12462 03:07:35 05.12.2025 Show
Trojan.PWS.Siggen4.12477 03:07:35 05.12.2025 Show
Trojan.MulDrop34.15005 03:07:35 05.12.2025 Show
Trojan.KillFiles2.4971 03:07:35 05.12.2025 Show
Trojan.MulDrop34.13974 03:07:34 05.12.2025 Show
Trojan.MulDrop34.14432 03:07:34 05.12.2025 Show
Trojan.PWS.Siggen4.11865 03:07:34 05.12.2025 Show
Trojan.MulDrop34.13851 03:07:34 05.12.2025 Show
Trojan.PWS.Siggen4.11330 03:07:34 05.12.2025 Show
Trojan.MulDrop34.13841 03:07:34 05.12.2025 Show
Trojan.DownLoader49.16741 03:07:34 05.12.2025 Show
Trojan.Inject6.18294 03:07:34 05.12.2025 Show
Trojan.MulDrop34.14581 03:07:34 05.12.2025 Show
Trojan.MulDrop34.14631 03:07:33 05.12.2025 Show
Trojan.MulDrop34.14054 03:07:33 05.12.2025 Show
Trojan.PWS.Siggen4.12437 03:07:33 05.12.2025 Show
Trojan.MulDrop34.14823 03:07:33 05.12.2025 Show
Trojan.MulDrop34.15047 03:07:33 05.12.2025 Show
Trojan.MulDrop34.14760 03:07:33 05.12.2025 Show
Trojan.PWS.Siggen4.12357 03:07:33 05.12.2025 Show
Trojan.PWS.Siggen4.12046 03:07:32 05.12.2025 Show
Trojan.DownLoader49.16815 03:07:32 05.12.2025 Show
Trojan.PWS.Siggen4.11328 03:07:32 05.12.2025 Show
Trojan.MulDrop34.14005 03:07:32 05.12.2025 Show
Trojan.MulDrop34.15190 03:07:32 05.12.2025 Show
Trojan.MulDrop34.14112 03:07:31 05.12.2025 Show
Trojan.Inject6.18329 03:07:31 05.12.2025 Show
Trojan.MulDrop34.14357 03:07:31 05.12.2025 Show
Trojan.PWS.Siggen4.11621 03:07:31 05.12.2025 Show
Trojan.MulDrop34.14863 03:07:31 05.12.2025 Show
Trojan.PWS.Siggen4.11314 03:07:31 05.12.2025 Show
Trojan.DownLoader49.16869 03:07:31 05.12.2025 Show
Trojan.PWS.Siggen4.11764 03:07:30 05.12.2025 Show
Trojan.PWS.Siggen4.12556 03:07:30 05.12.2025 Show
Trojan.Tofsee.6750 03:07:30 05.12.2025 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.