Crypt0L0cker – is a malicious software, which may damage users data. How is it possible? Crypt0L0cker is classified as ransomware, such programs encrypt many documents and files on computer by using special encrypting algorithm.
BTC ransomware – is a typical ransomware, which corrupts user’s files and documents and after asks money for “cure”. Mainly, BTC ransomware infects personal computers via e-mail attachments.
Kangaroo ransomware – is a common ransomware, that infects computers via e-mail attachments. As many ransomware it uses AES encryption algorithm to encrypt user’s documents and files, also it renames files and adds “.crypted_file” file extension.
Troldesh ransomware – is another malware with popular monetizing scheme. After appearing on computer, Troldesh begin to encrypt files and documents by using special encrypt algorithm.
Crysis ransomware – is a typical malicious crypto-software, which after infection starts to encrypt user’s documents and files (especially media and text files).
Cerber ransomware – is a typical crypto-ransomware, that encrypts users documents and files by using AES encryption algorithm. What happens if Cerber infects user’s PC? It starts encryption
Locky – is a crypto-ransomware, that may appear at user’s PC via e-mail attachments. Such mails have provocative messages, this is why users open attached documents and got infected. As many crypto-ransomware, after infecting Locky starts to encrypt files and documents.
Thor ransomware – is a malicious software, which encrypt users files and document using RSA-2048 key and AES combination and changing their name with adding .thor as file extension.
SHIT ransomware – is another ransomware, which encrypts user’s documents and important files. To decrypt them, user should pay to ransomware owners. This monetizing scheme is popular nowadays.