Crypt0L0cker – is a malicious software, which may damage users data. How is it possible? Crypt0L0cker is classified as ransomware, such programs encrypt many documents and files on computer by using special encrypting algorithm.
HappyLocker ransomware – is a typical ransomware, which encrypts user documents and files (especially media files) by using special encrypting algorithm. While encrypting files, HappyLocker also renames them and adds file extension .happy.
Esmeralda Ransomware -is a malicious software, that uses e-mail attachments with provocative messages to infect personal computer. Its main purpose is encrypting documents and files to get ransom for them.
BTC ransomware – is a typical ransomware, which corrupts user’s files and documents and after asks money for “cure”. Mainly, BTC ransomware infects personal computers via e-mail attachments.
Kangaroo ransomware – is a common ransomware, that infects computers via e-mail attachments. As many ransomware it uses AES encryption algorithm to encrypt user’s documents and files, also it renames files and adds “.crypted_file” file extension.
DummyLocker – is an uncommon malicious software, which is developed by cyber crooks. Why is it uncommon? Because it has own monetizing system: after reaching computer, program starts to encrypt user’s documents and files.
Troldesh ransomware – is another malware with popular monetizing scheme. After appearing on computer, Troldesh begin to encrypt files and documents by using special encrypt algorithm.
Crysis ransomware – is a typical malicious crypto-software, which after infection starts to encrypt user’s documents and files (especially media and text files).
Cerber ransomware – is a typical crypto-ransomware, that encrypts users documents and files by using AES encryption algorithm. What happens if Cerber infects user’s PC? It starts encryption