Search Solo Products, Services and others Overview of the Site Design and Build a Career Contact us for customer service and other feedback info SRN Micro Privacy Statement

 


SRN Micro launches new version of Solo Antivirus 2014 - December 24, 2013

                     SRN Micro, the growing antivirus software developing concern launched new improved version of Solo Antivirus 2014 Version. The new version effectively fights against viruses, worms, spyware, rootkits, keyloggers and other malicious programs. | More details 

W32.Conficker.Worm infects millions of systems - April 01, 2009

                     Conficker worm spreads through Windows MS08-067 server service vulnerability, shared network with weak passwords and copying itself to removable storage devices like pen drives.| More details 

SRN Micro launches Process Information Library - February 01, 2008

                     SRN Micro, the growing antivirus software developing concern launched new process information library. Solo antivirus process library has detailed information on viruses, trojans, adware and spyware processes. It helps you to find if your system is infected with any malicious process. | More details 

W32.Sober.AA@mm spreads in the wild - May 01, 2007

                     Sober.AA is a mass mailing worm uses e-mail addresses collected from the system to distribute infected mails. The worm uses its own SMTP engine to spread.| More details 

W32.Stration@mm worm spreads in the wild - October 23, 2006

                     Stration aka Warezov is a mass mailing worm, uses e-mail addresses collected from the infected system to distribute infected messages. Stration worm arrives as an e-mail attachment. It has the ability to download new variants of malware from Internet.| More details

SRN Micro launches new version of Solo Antivirus 2007 - October 3, 2006

                     SRN Micro, the growing antivirus software developing concern launched new improved version of Solo Antivirus 2007 - Version 5.0. The new version effectively fights against viruses and spyware. The new version comes with improved scan engine and online update facility.| More details 

W32.Blackmal.E@mm worm spreads in the wild - January 17, 2006

                     W32.Blackmal.E@mm aka VB.BI is a mass mailing worm, uses e-mail addresses collected from the infected system to distribute infected messages. It attempts spread through network shares.| More details 

Zotob worm spreads in the wild - August 14, 2005

                     Zotob is a network Worm, exploits LSASS and Microsoft Windows Plug and Play Service (PNP) vulnerabilities present in Windows as explained by Microsoft Security Bulletin MS04-011 and MS05-039. | More details 

Reatle worm spreads in the wild - July 15, 2005

                     Reatle is a mass mailing and network Worm, spreads using e-mail attachments and exploits a remote code execution vulnerability LSASS explained by Microsoft Security Bulletin MS04-011. | More details 

Mytob worm variants spreads in the wild - April 5, 2005

                     Mytob is a mass mailing worm, uses e-mail addresses collected from the infected system to distribute infected messages. It also spreads using the DCOM RPC vulnerability and the Microsoft Windows Local Security Authority Service Remote Buffer Overflow vulnerability. | More details 

W32.Beagle.AZ@mm spreads in the wild - Jan. 26, 2005

                     Beagle.AZ is a mass mailing worm, uses e-mail addresses collected from the infected system to distribute infected messages. Beagle worm arrives as an e-mail attachment.| More details 

W32.Sober.I@mm spreads in the wild - Nov. 19, 2004

                     Sober.I is a mass mailing worm uses e-mail addresses collected from the system to distribute infected mails. The worm uses its own SMTP engine to spread. The worm is written in visual basic and compressed with UPX.| More details 

W32.Beagle.AV@mm spreads in the wild - Oct. 29, 2004

                     Beagle.AV is a mass mailing worm, uses e-mail addresses collected from the infected system to distribute infected messages. Beagle worm arrives as an e-mail attachment.  Bagle.AV searches C to Z drives and copies itself to folders containing the string "share" or "sharing". | More details 

W32.Sasser.Worm spreads in the wild - Apr. 30, 2004

                     Sasser is a network Worm,  exploits a remote code execution vulnerability LSASS to infect target systems. It scans for IP addresses and infects unpatched systems. This worm targets Windows 2000, and Windows XP systems. Solo Antivirus can detect and remove Sasser worm and its variants safely. | More details 

W32.Netsky.P@mm spreads in the wild - Mar. 22 2004

                    Netsky.P is a modified variant of Netsky.C worm. This mass mailing worm spreads using  e-mail addresses collected from MSG, OFT, SHT, DBX, TBB, ADB, DOC, WAB, ASP, UIN, RTF, VBS, HTML, HTM, PL, PHP, TXT, SHTM, DHTM, CGI and EML files to distribute infected messages. Netsky.P worm arrives as an e-mail attachment. The infected attachment name, message body and subject is randomly chosen by the worm. | More details 

W32.Netsky.D@mm spreads in the wild - Mar. 01, 2004

                    Netsky.D is a modified variant of Netsky.C worm. This mass mailing worm spreads using  e-mail addresses collected from MSG, OFT, SHT, DBX, TBB, ADB, DOC, WAB, ASP, UIN, RTF, VBS, HTML, HTM, PL, PHP, TXT, SHTM, DHTM, CGI and EML files to distribute infected messages. Netsky.D worm arrives as an e-mail attachment. The infected attachment name, message body and subject is randomly chosen by the worm. | More details 

W32.Netsky.B@mm spreads in the wild - Feb. 18, 2004

                     Netsky.B is a modified variant of Netsky.A worm. This mass mailing worm spreads using  e-mail addresses collected from MSG, OFT, SHT, DBX, TBB, ADB, DOC, WAB, ASP, UIN, RTF, VBS, HTML, HTM, PL, PHP, TXT and EML files to distribute infected messages. Netsky.b worm arrives as an e-mail attachment. The infected attachment name, message body and subject is randomly chosen by the worm. | More details 

W32.Mydoom@mm spreads in the wild - Jan. 26, 2004

                     Novarg aka Mydoom is a mass mailing worm, uses  e-mail addresses collected from .wab, .adb, .tbb, .dbx, .asp, .php, .sht, .htm, .txt files to distribute infected messages. Novarg worm arrives as an e-mail attachment. The infected attachment name, subject and message body is randomly chosen by the worm. The worm also spreads using KaZaA P2P network.| More details 

W32.Mimail.J@mm spreads in the wild - Nov. 17, 2003

                     Mimail.J is a modified variant of Mimail.I worm. It attempts to steal credit card and personal information from the infected user. Mimail.J worm arrives as an e-mail attachment. It collects e-mail addresses stored in the local hard disk to distribute infected messages.| More details

W32.Mimail.C@mm spreads in the wild - Oct. 31, 2003

                      Mimail.C is a modified variant of Mimail worm. It collects e-mail addresses stored in the local hard disk to distribute infected messages. Mimail.C worm arrives as an e-mail attachment. The infected attachment name will be "photos.zip".| More details

W32.Swen.A@mm spreads in the wild - Sept. 18, 2003

                     Swen aka Gibe.F is an Internet worm, spreads using e-mail, KaZaA, IRC and network shares. Swen worm sends fakes email as it is an update coming from Microsoft. It is very similar to Gibe Worm and uses its own SMTP engine to send infected mails.| More details

W32.Sobig.F@mm spreads in the wild - Aug. 19, 2003

                     Sobig.F worm uses e-mail addresses collected from DBX, HTML, DBX, EML, HML, TXT and WAB files to send infected messages. It is very similar to Sobig.B Worm. Sobig.F infects Windows 95, 98, ME, 2000, NT, XP systems. It also copies to shared network drives. Sobig.F worm will not spread after 10th September, 2003| More details

W32.Blaster.Worm spreads in the wild - Aug. 11, 2003

                     Blaster worm exploits a vulnerability DCOM RPC [ Buffer Overrun In RPC Interface ] to infect target systems. The worm randomly scans for IP addresses and infects the vulnerable systems. This worm targets Windows NT, 2000, XP, and Windows Server 2003 systems | More details

W32.Sobig.E@mm spreads in the wild - Jun. 25, 2003

                     Sobig.E worm uses e-mail addresses collected from DBX, HTML, DBX, EML, HML, TXT and WAB files to send infected messages. It is very similar to Sobig.B Worm. Sobig.E infects Windows 95, 98, ME, 2000, NT, XP systems. It also copies to shared network drives. Sobig.E worm will not spread after July 13th 2003.| More details

W32.Bugbear.B@mm spreads in the wild - Jun. 04, 2003

                     BugBear.b is a new variant of Bugbear worm, uses e-mail addresses stored in Windows address book and network shares to spread. It collects addresses from .dbx, .mbx, .eml, and .ocs files to distribute infected messages. The worm randomly chooses the message body and subject. This variant infects local files in the hard disk. | More details

W32.Fizzer.A@mm spreads in the wild - May. 09, 2003

                     Fizzer is a mass mailing worm spreads through e-mail, Kazza P2P and IRC. It also copies to shared network drives and drops backdoor programs in the infected system. Fizzer uses e-mail addresses collected from Windows address book and Microsoft Outlook to send infected mails. | More details

W32.LoveGate.F@mm spreads in the wild - Mar. 24, 2003

                     Lovegate.F is a modified variant of Lovegate.C worm, uses e-mail addresses collected from *.ht* files to send infected messages. It also copies to shared network drives and drops backdoor programs in the system. | More details

W32.Lirva.A@mm worm spreads rapidly - Jan. 8, 2003

                     Lirva is a mass mailing Internet worm, spreads through e-mail, ICQ, IRC, KaZaA and open network shares. The message body and subject is randomly chosen from the worm body. It collects e-mail addresses from DBX, MBX, WAB, HTML, EML, HTM, TBB, SHTML, NCH and IDX files to send infected messages. | More details

Bugbear worm spreads in the wild - Sept. 30, 2002

                     BugBear is an Internet worm, uses e-mail addresses stored in Windows Address book and network shares. It also collects addresses from .dbx, .mbx, .eml, and .ocs files to distribute infected messages. The worm randomly chooses the message body and subject.| More details

Yaha.E Worm reported in the wild - July 17, 2002

                     Yaha.E is a mass mailing worm uses e-mail addresses stored in Windows Address book and also collects addresses from .ht* files to distribute infected messages. It also spreads through MSN messenger list, ICQ list and Yahoo pager list.| More details

Klez.H Worm heavily reported in the wild - Apr 18, 2002

                     Klez.H is modified variant of original Klez worm. Klez.H variant rapidly spreads in the wild. It arrives as an e-mail attachment and the attachments are embedded within the e-mail and it won't visible to the user.| More details

 Gibe Worm spreads in the wild - Jan 13, 2002

                     Gibe is an Internet worm uses Microsoft Outlook and its own SMTP engine to spread. The worm is 122880 bytes long and the e-mail attachment name will be "Q216309.exe". Gibe worm sends fakes email as it is an update coming from Microsoft.| More details

 Klez.E Worm reported in the wild - Oct 27, 2001

                     Klez.E is modified variant of original Klez worm. Klez.E variant rapidly spreads in the wild. I-worm/Klez.E arrives as an e-mail attachment. The attachments are embedded within the e-mail and it won't visible to the user.| More details

 APost Worm reported in the wild - Oct 22, 2001

                     APost is an Internet worm uses Microsoft Outlook to spread. The worm is 24,576 bytes long and written in Visual Basic 6.0. It needs "MSVBVM60.dll" to spread otherwise it will show dll missing error. The attachment name will be "Readme.exe". It is also known as I-Worm.Readme, WORM_APOST. | More details

 Nimda Worm spreads in the wild - Sep 21, 2001

                     Nimda is a mass mailing worm uses different techniques to spread. It will infect network shares, local PE files and already vulnerable Microsoft IIS web servers. Because of the IIS server infection it generates heavy network traffic. Nimda also uses CodeRed dropped trojan to find the target server.| More details

 CodeRed Worm strikes unprotected IIS servers - Jul 20, 2001

                     CodeRed worm spreads using .ida buffer overflow attack vulnerability in IIS Web servers. The worm will attack unprotected IIS servers. Web administrators are requested to install the security patch provided by Microsoft. | More details

 I-Worm/SirCam - New deadly worm spreading - Jul 19, 2001

                     SirCam is a mass mailing worm spread using e-mail addresses stored in Windows Address book and also collects addresses from temporary Internet folder. It will e-mail the infected files using its own SMTP engine. SirCam is also network aware worm. It searches for network shares and infects them too. | More details

 VBS/HomePage - A new worm spreads rapidly - May 08, 2001

                     VBS/HomePage aka VBS/VBSWG.X is a encrypted VB script worm uses Microsoft outlook to spread. The email message subject will be " Homepage " and the attachment will be "homepage.HTML.vbs" and the message body will be "Hi!
You've got to see this page! It's really cool ;O)"
. | More details

 I-Worm/BadTrans reported in the wild - April 11, 2001

                     BadTrans is an encrypted worm spreads via MAPI function of Microsoft Outlook and it also drops Trojan.PSW.Hooker.b in the victims PC. The virus author can steal username and password details using the password stealer. | More details

 Win32/Magistr - A high risk worm spreading - Mar 04, 2001

                     Win32/Magistr is a complex polymorphic worm spreads via email and it contains virus components to infect PE files [*.EXE, *.SCR] in Windows environment. It infects local machine and PCs connected to the local network (LAN). It is discovered in March 2001 and frequently reported in the wild. | More details

 Win32/Kriz to strike again on Christmas day - Dec 20, 2000

                     Win32/Kriz is a PE file virus infects EXE files under Win9x and WinNT 4.0 platforms. This virus will wake up or get activated on 25th of December [Christmas day] and it will damage the motherboard and the hard disk. The damage caused could be extreme and expensive. | More details

 Hybris aka Hahaha Worm Spreading Rapidly - Nov 14, 2001

Hybris is a complex deadly worm, it will update the plugins from the virus author's site or through a virus conference news group alt.comp.virus. The worm uses Win95/Babylonia virus technique to download plugins, but it uses strong encryption on plugins using RSA 128 bit keys. The worm patches WSOCK32.DLL to email automatically. | More details

I-Worm/Prolin reported in the wild - Dec 4, 2000

                     Proilin is an Internet worm, uses Microsoft Outlook to email itself.The worm is Prolin 36,834 bytes long and written in Visual Basic version 6. It needs "MSVBVM60.dll" to spread otherwise it show DLL missing error. The e-mail attachment name will be will "Creative.exe". | More details

I-Worm/MTX - A virus carrier spreads via e-mail - Sep 26, 2000

                     MTX is a complex encrypted worm spreads via email and carries a virus to infect local machine files. It is discovered one month back and frequently reported in the wild. When executed, the worm patches WSOCK32.DLL to email automatically. The virus component uses EPO ( Entry Point Obscuring ) technology to infect files. | More details

Are you forced to wish "SHANKAR'S" birthday - Jul 23, 2000

                     W97M/Marker-O is a modified variant of W97M/Marker virus. It is a Polymorphic Word macro virus. While opening the document, If checks for system date. If the month is 7 and day is greater than or equal to 23 it will display the message "Did You Wish Shankar on his Birthday ?". It will alow the user to proceed. | More details

VBS/Stages worm downs many e-mail servers - Jun 21, 2000

                     VBS/Stages is a multi application Windows worm uses Microsoft outlook, mIRC, Pirch and mapped drives to spread. Because of the mass mailing routine it downs many e-mail servers. The attachment name will be "LIFE_STAGES.TXT.SHS" and size will be 39,936 bytes. | More details

Win32/FunLove virus Detected - November 16, 1999

                     This virus is a Win32 PE file virus infects EXE, SCR, OCX files under Win9x and WinNT 4.0 platforms. The infected files will increase by 4099 bytes. What is notable about this virus is that it uses a new strategy to attack the Windows NT file security system and it runs as a service on Windows NT systems. | More details

Dangerous E-mail worm Explorezip - June 22, 1999

                     ExploreZip is an e-mail worm, it uses standard e-mail software such as Outlook, Outlook Express and Exchange to spread. It infects Windows 95/98/NT systems and damages the data. It searches for the files with extensions doc, xls, ppt, h, asm, c, cpp in the local hard drives and mapped drives and reduces the file size to zero byte. It will infect other networked computers too. | More details

CIH - The first virus attacks BIOS chips - August 14, 1998

                     A more dangerous and deadly virus called "CIH" has spread rapidly and remains dormant in many computers. This virus will wake up or get activated on 26th of April and it will damage the motherboard and the hard disk. The damage caused could be extreme and expensive.| More details