Troldesh ransomware – is another malware with popular monetizing scheme. After appearing on computer, Troldesh begin to encrypt files and documents by using special encrypt algorithm.
Crysis ransomware – is a typical malicious crypto-software, which after infection starts to encrypt user’s documents and files (especially media and text files).
Cerber ransomware – is a typical crypto-ransomware, that encrypts users documents and files by using AES encryption algorithm. What happens if Cerber infects user’s PC? It starts encryption
Jack.pot ransomware – is another ransomware, that after infecting computers encrypts users files and documents (also renaming them and adding .coin as file extension).
Locky – is a crypto-ransomware, that may appear at user’s PC via e-mail attachments. Such mails have provocative messages, this is why users open attached documents and got infected. As many crypto-ransomware, after infecting Locky starts to encrypt files and documents.
Thor ransomware – is a malicious software, which encrypt users files and document using RSA-2048 key and AES combination and changing their name with adding .thor as file extension.
SHIT ransomware – is another ransomware, which encrypts user’s documents and important files. To decrypt them, user should pay to ransomware owners. This monetizing scheme is popular nowadays.
Cerber3 – is a popular ransomware, that infected a lot of computers at this year (2016). What does it do? As many ransomwares, Cerber3 encrypt random files (or all files at Documents folder).
Odin ransomware – is a malicious software, that encrypts users documents and files. Then it offer user to pay for decrypting, otherwise ransomware will rise the price. Mainly, Odin ransomware renames encrypted files and add .odin as file extension.