JohnyCryptor – is a sneaky malicious software, which may appear at users PC via e-mail attachments. What is malicious in its actions? Read everything about JohnyCrypt in our Guide.
Crypt0L0cker – is a malicious software, which may damage users data. How is it possible? Crypt0L0cker is classified as ransomware, such programs encrypt many documents and files on computer by using special encrypting algorithm.
HappyLocker ransomware – is a typical ransomware, which encrypts user documents and files (especially media files) by using special encrypting algorithm. While encrypting files, HappyLocker also renames them and adds file extension .happy.
CTB-Locker – is a typical ransomware, that use well-known monetizing system. It encrypts documents and files, after this it offers decryptor for money (about 0.5 bitcoins).
Esmeralda Ransomware -is a malicious software, that uses e-mail attachments with provocative messages to infect personal computer. Its main purpose is encrypting documents and files to get ransom for them.
BTC ransomware – is a typical ransomware, which corrupts user’s files and documents and after asks money for “cure”. Mainly, BTC ransomware infects personal computers via e-mail attachments.
Kangaroo ransomware – is a common ransomware, that infects computers via e-mail attachments. As many ransomware it uses AES encryption algorithm to encrypt user’s documents and files, also it renames files and adds “.crypted_file” file extension.
DummyLocker – is an uncommon malicious software, which is developed by cyber crooks. Why is it uncommon? Because it has own monetizing system: after reaching computer, program starts to encrypt user’s documents and files.
Troldesh ransomware – is another malware with popular monetizing scheme. After appearing on computer, Troldesh begin to encrypt files and documents by using special encrypt algorithm.
Crysis ransomware – is a typical malicious crypto-software, which after infection starts to encrypt user’s documents and files (especially media and text files).