Malware Warrior Blog
Jack.pot ransomware – is another ransomware, that after infecting computers encrypts users files and documents (also renaming them and adding .coin as file extension).
Locky – is a crypto-ransomware, that may appear at user’s PC via e-mail attachments. Such mails have provocative messages, this is why users open attached documents and got infected. As many crypto-ransomware, after infecting Locky starts to encrypt files and documents.
Thor ransomware – is a malicious software, which encrypt users files and document using RSA-2048 key and AES combination and changing their name with adding .thor as file extension.
SHIT ransomware – is another ransomware, which encrypts user’s documents and important files. To decrypt them, user should pay to ransomware owners. This monetizing scheme is popular nowadays.
Cerber3 – is a popular ransomware, that infected a lot of computers at this year (2016). What does it do? As many ransomwares, Cerber3 encrypt random files (or all files at Documents folder).