Kangaroo ransomware – is a common ransomware, that infects computers via e-mail attachments. As many ransomware it uses AES encryption algorithm to encrypt user’s documents and files, also it renames files and adds “.crypted_file” file extension.
DummyLocker – is an uncommon malicious software, which is developed by cyber crooks. Why is it uncommon? Because it has own monetizing system: after reaching computer, program starts to encrypt user’s documents and files.
Troldesh ransomware – is another malware with popular monetizing scheme. After appearing on computer, Troldesh begin to encrypt files and documents by using special encrypt algorithm.
Crysis ransomware – is a typical malicious crypto-software, which after infection starts to encrypt user’s documents and files (especially media and text files).
Cerber ransomware – is a typical crypto-ransomware, that encrypts users documents and files by using AES encryption algorithm. What happens if Cerber infects user’s PC? It starts encryption
Jack.pot ransomware – is another ransomware, that after infecting computers encrypts users files and documents (also renaming them and adding .coin as file extension).
Locky – is a crypto-ransomware, that may appear at user’s PC via e-mail attachments. Such mails have provocative messages, this is why users open attached documents and got infected. As many crypto-ransomware, after infecting Locky starts to encrypt files and documents.
Thor ransomware – is a malicious software, which encrypt users files and document using RSA-2048 key and AES combination and changing their name with adding .thor as file extension.
SHIT ransomware – is another ransomware, which encrypts user’s documents and important files. To decrypt them, user should pay to ransomware owners. This monetizing scheme is popular nowadays.
Cerber3 – is a popular ransomware, that infected a lot of computers at this year (2016). What does it do? As many ransomwares, Cerber3 encrypt random files (or all files at Documents folder).