Kangaroo ransomware – is a common ransomware, that infects computers via e-mail attachments. As many ransomware it uses AES encryption algorithm to encrypt user’s documents and files, also it renames files and adds “.crypted_file” file extension.
Malware Warrior Blog
Troldesh ransomware – is another malware with popular monetizing scheme. After appearing on computer, Troldesh begin to encrypt files and documents by using special encrypt algorithm.
Crysis ransomware – is a typical malicious crypto-software, which after infection starts to encrypt user’s documents and files (especially media and text files).
Bytefence Anti-Malware – is a legal protective software, which claims to protect computer from various malicious programs. It is developed by Byte Technologies LLC (they have official website: www.bytefence.com).
Cerber ransomware – is a typical crypto-ransomware, that encrypts users documents and files by using AES encryption algorithm. What happens if Cerber infects user’s PC? It starts encryption
Locky – is a crypto-ransomware, that may appear at user’s PC via e-mail attachments. Such mails have provocative messages, this is why users open attached documents and got infected. As many crypto-ransomware, after infecting Locky starts to encrypt files and documents.
Thor ransomware – is a malicious software, which encrypt users files and document using RSA-2048 key and AES combination and changing their name with adding .thor as file extension.