Encryptor RaaS
Posted: July 30, 2015
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 8/10 |
---|---|
Infected PCs: | 42 |
First Seen: | July 30, 2015 |
---|---|
Last Seen: | August 12, 2022 |
OS(es) Affected: | Windows |
Encryptor RaaS is a harmful Trojan that aims directly at your personal files and makes them unreadable. If it manages to sneak into your system, the vicious ransomware will immediately perform a system scan to locate all of your valuable data. Encryptor RaaS can lock files with over 400 different extensions – including your pictures, Office documents, videos, music, presentations and so on. The only files that remain unaffected are used by the operating system, and the cyber criminals want your PC to be able to load. If your system is unable to boot, you will never notice the lockdown screen that appears after the encryption process is over. According to it, you need to pay a certain ransom to get back your access to the encrypted files. You will see a link towards some site on the TOR network, which should provide you with all the necessary details about the payment. On no occasion should you agree to pay the requested amount of Bitcoins. The cyber criminals may not unlock your files, and even if they do, your money will be used for more malicious operations. An interesting aspect of Encryptor RaaS is that it is open to the public. This behavior has been seen in other types of ransomware as well – for example, Tox. When evil-minded people get Encryptor RaaS and modify it to their taste, they can spread it as they wish. This fact means that in addition to the commonly used e-mail spam technique, the vicious Trojan may also be included in some botnets. The best protection you can have is a reputable anti-malware application as its real-time shield can block the incoming malicious files.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.