Although Kangaroo ransomware may seem a new threat, it is nothing but a recently showed up version of Apocalypse ransomware. This new release targets for even wider range of extensions, but in the whole operates as other malware of this type.
No ratings yet. What is Troldesh ransomware? Troldesh ransomware is known as a serious threat for a while now – it has released several versions and keeps updating. Like any typical ransomware, it is able to detect and cipher all popular types of files. After hijacking the data, it alerts…
Crysis ransomware is one of the versions of the diverse threat known as virus-encoder. The same as any other typical ransomware, Crysis encryption virus infiltrates system stealthily and takes your data as a hostage. For retrieving your photos, media files and documents the creators of Crysis ransomware demand a certain amount of money after paying which you will get the decrypting application. Or so they say. In fact, there are no guarantees that the scammers will stand by their promise.
Thor ransomware is a encrypting successor of ill-famed Locky ransomware, a threat that already has many variants. However, it significantly differs from previous editions of the virus. First of all, it combines RSA and AES ciphers, which makes decryption of files way more difficult than before. Second, now it is capable of scattering over 400 file types. Altogether these factors make the malware a serious hazard to information safety.
HCrypto is another representative of crypto-malware group. It appeared in early October 2016 and was immediately considered to be a serious threat to its victims’ personal data. The ransomware encrypts all files on all drives, including the removable ones and online clouds, and then blackmails the victim. The cybercriminals present the demands in ex3t.pdf file that is put in every directory containing encrypted files.
.LOL! Encryption virus looks like a prank joke, however, people who fell victim of it don’t find it funny at all. The threat appears to be real and hazardous, as it is nothing but a ransomware that deciphers your data and demands money in exchange for it.
In the forefront of ransomware development, yet another hazard has appeared. Its name is UnblockUPC and it successfully utilizes the techniques that its predecessors use. It stealthily enters the systems and start encryption, after which the ransomware displays a notification with demands for decryption. The instructions for obtaining the decryption key are contained within Unblock your files.html, which states that the victim is punished for visiting illegal sites.
The infection of n1n1n1 ransomware may be considered as a prank or a scareware, as it doesn’t look very hazardous. A meager ransom message and a plainly-designed website don’t give an impression of a serious threat. However, the actions of ransomware leave no doubt that this infection will bring many troubles and place in jeopardy all data kept on the computer.
FenixLocker, or firstname.lastname@example.org ransomware is one of the newly arose crypto-viruses. This type of threats is especially dangerous, as it is capable of stealth infiltration of a system and then of encrypting almost all of the files present on the computer.
Cerber encryption virus has underwent many changes since its first release, and at the end of the summer 2016 there is a new third version of the ransomware – Cerber3. Most likely this has been done to overcome the free Cerber Decryptor that is able to decrypt the files affected by two previous versions. The Cerber3 threat now adds the .cerber3 extension to the files which are now encrypted individually.