Bitdefender AntiMalware Detection

Explore the inner workings of the Bitdefender AntiMalware engine, uncovering its strong detection capabilities and systematic email classification.

Malware Detection and Actions

When the Bitdefender AntiMalware engine identifies a malware threat in any attachment of the original message, it labels the message as infected. To safeguard the recipient, Axigen replaces the original message with an informative text.

If you believe this action was inappropriate, please reach out to the message sender and request them to resend the message with all attachments included in a password-protected archive.

Threat Types

THREAT-TYPE-VIRUS

This indicates that the object is a legitimate file that has been infected by a virus. While some infected files can be disinfected and provided to the user, certain types of infections, such as Trojans, cannot be disinfected. It is important to note that viruses are unique in their ability to replicate themselves.

THREAT-TYPE-SPYWARE

This signifies that the object is a spyware application, which falls under a broad category of malicious software. Spyware applications engage in various malicious activities, such as stealing passwords and credit card information, generating false security alerts, and unauthorized monitoring.

THREAT-TYPE-ADWARE

This denotes that the object is an adware application. Adware is a type of malicious software designed to display advertisements on the user's desktop or web browser. It is often used to track user browsing habits and deliver targeted ads. Some adware may be installed with user consent, while others are installed without consent.

THREAT-TYPE-DIALER

This code indicates that the object is a dialer application. Dialers use the computer's modem to dial premium-rate numbers, often resulting in exorbitant charges. They typically do not provide clear information about the actual cost of the calls. Dialers may be installed with user consent but pose significant financial risks.

THREAT-TYPE-APP

This signifies that the object is a potentially malicious application frequently used for nefarious purposes by third parties. Although the application itself may not be inherently malicious, it carries a higher risk of being utilized for malicious activities and is often installed without user consent. Examples include web proxies, remote administration software, and similar applications.

THREAT-TYPE-APP

This signifies that the object is a potentially malicious application frequently used for nefarious purposes by third parties. Although the application itself may not be inherently malicious, it carries a higher risk of being utilized for malicious activities and is often installed without user consent. Examples include web proxies, remote administration software, and similar applications.

THREAT-TYPE-NEEDSANDBOX

This signifies that the object is a potentially malicious application frequently used for nefarious purposes by third parties. Although the application itself may not be inherently malicious, it carries a higher risk of being utilized for malicious activities and is often installed without user consent. Examples include web proxies, remote administration software, and similar applications.