Mal/EncPk-NS
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Ranking: | 8,079 |
Threat Level: | 10 % (Normal) |
Infected Computers: | 304 |
First Seen: | June 26, 2012 |
Last Seen: | September 19, 2023 |
OS(es) Affected: | Windows |
Mal/EncPk-NS is a malicious downloader Trojan that has been linked to various spam email campaigns. The main purpose of the Mal/EncPk-NS Trojan is to enter the victim's computer, establish a backdoor (an unauthorized hole in the infected system's security), and then to connect to a remote server using that backdoor in order to download and install other malware on the victim's computer system. Like most Trojans, Mal/EncPk-NS does not have the capacity to spread on its own and depends on social engineering attacks in order to convince the victims themselves to download and install this malware infection on their computer system.
Table of Contents
Mal/EncPk-NS Has Been Linked to a Recent Spam Email Campaign
Mal/EncPk-NS has many aliases and is known differently by different PC security software manufacturers. ESG malware analysts have connected Mal/EncPk-NS to a spam email campaign that tries to scare computer users by claiming that it contains an attached nude photograph of the victim's girlfriend or of the victims themselves. There are many variants of this malicious spam email message, all containing a ZIP file attachment labeled Photos.zip. Of course, this attachment actually contains Mal/EncPk-NS that will be settled automatically just after the victim opens this malicious email attachment.
In some variants of this infection, the ZIP archive may also contain an actual nude photograph to distract the victim while the installation of Mal/EncPk-NS occurs in the background. Most of the messages associated with this spam email campaign will be threatening or imply that the photos are compromising for the victim in some way. ESG security researchers suggest using an updated spam filter in order to intercept these malicious email messages before they arrive in your inbox, and to be extremely careful about opening file attachments contained in unsolicited email messages.
Protecting Your Computer System from Mal/EncPk-NS
There are several measures you can take to protect your computer from a Mal/EncPk-NS infection. These include the following:
- Use a reliable anti-malware scanner and firewall at all times.
- Keep your security software and anti-spam filter updated.
- Never open unsolicited email attachments.
- Never click on links unless you are absolutely sure what they contain.
- Always scan all files with a reliable anti-malware program before downloading them onto your computer system.
It is also crucial to bear in mind that, although software can protect your computer system from malware, the best tools you have to protect yourself from malware like Mal/EncPk-NS is common sense and not being careless when going online.
Aliases
15 security vendors flagged this file as malicious.
Anti-Virus Software | Detection |
---|---|
Fortinet | W32/SearchRedirect.BDX!tr.bdr |
McAfee-GW-Edition | Artemis!220A51E34247 |
F-Secure | Gen:Variant.Kazy.138170 |
Kaspersky | HEUR:Trojan.Win32.Generic |
McAfee | RDN/Generic.tfr!n |
AVG | Win32/Heur |
Ikarus | Virus.Win32.Heur |
GData | Win32:Injector-ARH |
Comodo | TrojWare.Win32.Agent.smak |
Avast | Win32:Injector-ARH [Trj] |
Symantec | WS.Reputation.1 |
Panda | Trj/OCJ.B |
AVG | Generic30.AQGW |
Fortinet | W32/Kryptik.APLJ |
TrendMicro | PAK_Generic.015 |
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.