Mal/EncPk-NS
Posted: June 26, 2012
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Ranking: | 8,268 |
---|---|
Threat Level: | 1/10 |
Infected PCs: | 717 |
First Seen: | June 26, 2012 |
---|---|
Last Seen: | October 14, 2023 |
OS(es) Affected: | Windows |
Mal/EncPk-NS is a Trojan that's distributed via spam e-mail messages, with message templates including such frauds as fake pornographic pictures and fake threats of legal action. Although a full analysis of Mal/EncPk-NS remains forthcoming, Mal/EncPk-NS has a high probability of installing other PC threats, modifying your security settings in negative ways, stealing personal information or allowing your PC to be controlled from a remote C&C server. Because SpywareRemove.com malware research team has found that Mal/EncPk-NS is usually distributed in the form of a file attachment, scanning files prior to downloading them can help to protect your PC from both Mal/EncPk-NS and similar Trojans (such as Troj/Zbot-CCH).
When Trojan Attacks are the Only Things That Saucy Pics Have to Show You
As a Trojan with readily-identifiable functions, Mal/EncPk-NS has been detectable by generic (or heuristic) detection methods for years, although recent attacks that are specifically attributable to Mal/EncPk-NS have been seen only in 2012. These 2012 attacks take the form of e-mail messages that use a variety of pretenses to lure you into installing Mal/EncPk-NS willingly, such as:
- Fake legal action notices:
The police investigation is under way now. You'll be really sorry about what you have done.
- Fake warnings about supposed privacy invasion, account break-ins and theft of personal information (including pictures) on your part:
Lets put this behind us once and for all I know you broke into my email.
- Fake nude photographs of lovers:
Sorry to disturb you
Someone sent me thee pictures they seem to be from you and your boyfriend I'm really troubled by this why do you send your private naked photos around?? this is beyound my understanding. It's in attachment
Although these e-mails use embarrassment and fear as heavy emotional incentives to make you open their file attachments, simply scanning their files prior to opening them should allow you to avoid a Mal/EncPk-NS infection with ease. SpywareRemove.com malware researchers also note that Mal/EncPk-NS variants have been found to have variable file sizes, from 200K to over 600K. There is also a high likelihood of these .exe files being mislabeled (so that they appear to be archive or image files).
Post-Recovery from Falling for Mal/EncPk-NS's Photographic Lure
While Mal/EncPk-NS hasn't been reported to display obvious symptoms, SpywareRemove.com malware analysts have found the following surreptitious attacks to be likely for e-mail-distributed Trojans like Mal/EncPk-NS:
- Altered security settings that cause your PC to be unusually vulnerable to other attacks. This can include open network ports, disabled browser security settings or Windows Registry changes to allow Mal/EncPk-NS to launch itself automatically.
- The installation of other PC threats that Mal/EncPk-NS places on your computer without your permission. Common payloads for PC threats like Mal/EncPk-NS can be fake security programs, browser hijackers or spyware that steal account login-related data.
- Blocked security programs; Windows Task Manager, anti-virus scanners and firewall tools are all commonly-blocked programs. You may also experience fake pop-ups that announce that these programs are infected or damaged.
Because Mal/EncPk-NS may also have other forms of hostile software working alongside Mal/EncPk-NS, SpywareRemove.com malware researchers stimulate you to scan your PC as carefully as possible to remove Mal/EncPk-NS and its payload effectively.
Aliases
More aliases (80)
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.