Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Android.Hidden.12346 22:12:01 11.06.2025 Show
Android.Spy.7220 21:07:14 11.06.2025 Show
Android.Gexin.1892 15:01:23 11.06.2025 Show
Android.Click.1819 13:27:44 11.06.2025 Show
Android.DownLoader.5637 06:50:56 10.06.2025 Show
Trojan.DownLoader48.43038 03:01:29 11.06.2025 Show
Trojan.DownLoader48.42965 03:01:29 11.06.2025 Show
Trojan.MulDrop32.9569 03:01:29 11.06.2025 Show
Trojan.Inject5.55358 03:01:29 11.06.2025 Show
Trojan.Siggen31.32698 03:01:29 11.06.2025 Show
Trojan.Inject5.55329 03:01:29 11.06.2025 Show
Trojan.Inject5.55373 03:01:29 11.06.2025 Show
Trojan.DownLoader48.42998 03:01:29 11.06.2025 Show
Trojan.DownLoader48.42945 03:01:29 11.06.2025 Show
Trojan.Siggen31.32978 03:01:29 11.06.2025 Show
Trojan.DownLoader48.42932 03:01:28 11.06.2025 Show
Trojan.Siggen31.32731 03:01:28 11.06.2025 Show
Trojan.Gozi.1311 03:01:28 11.06.2025 Show
Trojan.DownLoader48.43013 03:01:28 11.06.2025 Show
Trojan.Inject5.55425 03:01:28 11.06.2025 Show
Trojan.Siggen31.32765 03:01:28 11.06.2025 Show
Trojan.Inject5.55350 03:01:28 11.06.2025 Show
Trojan.Inject5.55402 03:01:28 11.06.2025 Show
Trojan.Siggen31.32956 03:01:28 11.06.2025 Show
Trojan.DownLoader48.42898 03:01:28 11.06.2025 Show
Trojan.Siggen31.32922 03:01:28 11.06.2025 Show
Trojan.Siggen31.32986 03:01:28 11.06.2025 Show
Trojan.DownLoader48.42996 03:01:27 11.06.2025 Show
Trojan.Siggen31.32921 03:01:27 11.06.2025 Show
Trojan.Siggen31.32808 03:01:27 11.06.2025 Show
Trojan.DownLoader48.42926 03:01:27 11.06.2025 Show
Trojan.MulDrop32.9460 03:01:27 11.06.2025 Show
Trojan.Siggen31.32712 03:01:27 11.06.2025 Show
Trojan.Siggen31.32905 03:01:26 11.06.2025 Show
Trojan.Siggen31.32887 03:01:26 11.06.2025 Show
Trojan.Siggen31.33099 03:01:26 11.06.2025 Show
Trojan.MulDrop32.9544 03:01:26 11.06.2025 Show
Trojan.MulDrop32.9589 03:01:26 11.06.2025 Show
Trojan.MulDrop32.9617 03:01:26 11.06.2025 Show
Trojan.Siggen31.32704 03:01:26 11.06.2025 Show
Trojan.Inject5.55383 03:01:26 11.06.2025 Show
Trojan.MulDrop32.9434 03:01:26 11.06.2025 Show
Trojan.Siggen31.32717 03:01:26 11.06.2025 Show
Trojan.MulDrop32.9363 03:01:26 11.06.2025 Show
Trojan.MulDrop32.9454 03:01:26 11.06.2025 Show
Trojan.MulDrop32.9495 03:01:26 11.06.2025 Show
Trojan.MulDrop32.9355 03:01:26 11.06.2025 Show
Trojan.PWS.Lumma.2965 03:01:25 11.06.2025 Show
Trojan.Siggen31.32726 03:01:25 11.06.2025 Show
Trojan.DownLoader48.42920 03:01:25 11.06.2025 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.