Library
My library

Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Android.Locker.18195 13:24:13 26.03.2025 Show
Android.Locker.18194 13:14:56 26.03.2025 Show
Android.BankBot.Coper.6738 13:14:49 26.03.2025 Show
Trojan.Siggen31.3877 03:15:23 26.03.2025 Show
Trojan.DownLoader48.22094 03:15:22 26.03.2025 Show
Trojan.MulDrop29.60115 03:15:22 26.03.2025 Show
Trojan.MulDrop29.60607 03:15:22 26.03.2025 Show
Trojan.MulDrop29.60331 03:15:22 26.03.2025 Show
Trojan.MulDrop29.58960 03:15:22 26.03.2025 Show
Trojan.Siggen31.3948 03:15:21 26.03.2025 Show
Trojan.MulDrop29.60947 03:15:21 26.03.2025 Show
Trojan.MulDrop29.61531 03:15:21 26.03.2025 Show
Trojan.MulDrop29.61765 03:15:20 26.03.2025 Show
Trojan.MulDrop29.61518 03:15:20 26.03.2025 Show
Trojan.MulDrop29.59886 03:15:20 26.03.2025 Show
Trojan.MulDrop29.60904 03:15:18 26.03.2025 Show
Trojan.MulDrop29.60290 03:15:18 26.03.2025 Show
Trojan.DownLoader48.21784 03:15:18 26.03.2025 Show
Trojan.PWS.Wsgame.703.origin 03:15:18 26.03.2025 Show
Trojan.DownLoader48.22091 03:15:18 26.03.2025 Show
Trojan.MulDrop29.61613 03:15:17 26.03.2025 Show
Trojan.MulDrop29.61639 03:15:17 26.03.2025 Show
Trojan.MulDrop29.60124 03:15:17 26.03.2025 Show
Trojan.MulDrop29.59613 03:15:17 26.03.2025 Show
Trojan.Inject5.19598 03:15:17 26.03.2025 Show
Trojan.MulDrop29.61252 03:15:16 26.03.2025 Show
Trojan.Siggen31.3878 03:15:16 26.03.2025 Show
Trojan.MulDrop29.59567 03:15:16 26.03.2025 Show
Trojan.MulDrop29.60093 03:15:16 26.03.2025 Show
Trojan.Siggen31.3919 03:15:16 26.03.2025 Show
Trojan.MulDrop29.58440 03:15:16 26.03.2025 Show
Trojan.MulDrop29.60032 03:15:16 26.03.2025 Show
Trojan.DownLoader48.22050 03:15:15 26.03.2025 Show
Trojan.MulDrop29.61426 03:15:15 26.03.2025 Show
Trojan.MulDrop29.59779 03:15:15 26.03.2025 Show
Trojan.MulDrop29.60863 03:15:15 26.03.2025 Show
Trojan.MulDrop29.62128 03:15:15 26.03.2025 Show
Trojan.Siggen31.3881 03:15:14 26.03.2025 Show
Trojan.MulDrop29.61574 03:15:13 26.03.2025 Show
Trojan.DownLoader48.22039 03:15:13 26.03.2025 Show
Trojan.MulDrop29.61637 03:15:13 26.03.2025 Show
Trojan.MulDrop29.59856 03:15:12 26.03.2025 Show
Trojan.MulDrop29.58806 03:15:11 26.03.2025 Show
Trojan.KillFiles2.3371 03:15:11 26.03.2025 Show
Trojan.MulDrop29.58804 03:15:11 26.03.2025 Show
Trojan.Siggen31.3945 03:15:11 26.03.2025 Show
Trojan.MulDrop29.56139 03:15:11 26.03.2025 Show
Trojan.MulDrop29.59508 03:15:10 26.03.2025 Show
Trojan.MulDrop29.61121 03:15:10 26.03.2025 Show
Trojan.MulDrop29.58805 03:15:10 26.03.2025 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.