N1n1n1 Ransomware
Posted: September 7, 2016
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 8/10 |
---|---|
Infected PCs: | 19 |
First Seen: | September 7, 2016 |
---|---|
Last Seen: | February 3, 2020 |
OS(es) Affected: | Windows |
The N1n1n1 Ransomware is a file encryption Trojan that solicits money by enciphering your data and offering to sell you a decryption solution. Con artists may not follow through after receiving their payments, and free decryptors are not available for every Trojan of this type. Protect your information by standard backup techniques and keep your PC safe by using anti-malware products for guarding against (or deleting) the N1n1n1 Ransomware.
A New Trojan to Scramble Your Saved Data's Ones and Zeros
The majority of reporting on the file encryption threat industry centers around several, major families of Trojans currently, including the DetoxCrypto, the Crysis and the Troldesh Ransomware. However, not every threat of this category is assignable to a family. Trojans without discernible relatives, such as the new the N1n1n1 Ransomware, are less likely of receiving the attention required by PC security researchers to create free decryption options.
The N1n1n1 Ransomware is a Trojan that malware experts have yet to associate with earlier samples of file encryption Trojans. Its attacks include:
- The N1n1n1 Ransomware encodes your media files with an algorithm yet to be confirmed, although similar threats often use a variant of AES. It also leaves the 'the N1n1n1' string as an apparent signature in the file body data, which is an uncommon attribute for most file encrypting Trojans. Any file names also may experience changes such as an inserted extension, e-mail address, an ID number, or a series of randomly generated characters.
- The N1n1n1 Ransomware also uses the commonly preferred technique of generating duplicates of ransom messages in TXT and HTML formats. These messages target English-speaking victims, but also include links to Web translation tools for PC users insufficiently fluent in the language. Notably, malware experts find no direct mention of the ransom fee required for decryption in the messages. Similar attacks often gained the victim's trust by, first, providing a download link for a decryption key and requiring the ransom's payment afterward.
Saying Night-Night to the N1n1n1 Ransomware
One fact that con artists fail to mention during a typical file ransoming discussion is that they may just as often receive their pay and then take no further actions. Although some PC security institutions do provide free decryption help, some families of file encryption Trojans have efficient protection against decoding. Additionally, malware experts stress that lesser known threats like the N1n1n1 Ransomware are likely of never seeing the attention to have a decryptor made public, at all.
These limitations emphasize why all PC users with valuable files should back their content up to a separate drive not attached to their primary work machines. Scanning e-mail attachments, using difficult-to-hack RDP settings, updating exploitable software and rotating complex passwords are all relevant forms of defense against the N1n1n1 Ransomware's most likely infection vectors. If all of these steps do fail, remove the N1n1n1 Ransomware by scanning your PC with an anti-malware product.
Being a 'minor league' Trojan with a quantitatively small campaign doesn't mean that the N1n1n1 Ransomware can't be just as harmful as a high-level, heavily publicized threat. Taking your PC's defenses for granted can come with permanent consequences from even the most minor examples of threatening software.