Scarab-CyberGod is a common version of the Scarab Ransomware, which encrypts all files on the user's PC. Files that were attacked by this virus get CyberGod .CyberGod extension. All encrypted data become unusable for further use. The virus creates CyberGod RECOVERY INFORMATION.TXT text file, which contains a detailed description of the terms and price the redemption.
Torchwood is a cryptovirus that extorts money from users. The activity of this cryptovirus was noticed as early as 2013 and the hackers updated it and improved it. Like many similar viruses, Torchwood encrypts user data. Many file formats can be encrypted, including archives, PDF files, images, videos, Microsoft Office documents and more.
Kraken Cryptor is another ransomware, encrypting most of the user files that are in the system. For example, it encrypts office documents, audio and video files, archives, PDF files and so on. The virus uses the algorithm of encryption and changes the extensions of infected files using a rather original scheme.
N1N1N1 is an encrypting virus that encrypts most of the user files on the PC. This cryptovirus uses the AES encryption algorithm and changes the file extension of the victims to .n1n1n1. Let's look at a couple of examples for clarity: photo.png becomes a photo.png.n1n1n1 or document.docx looks like document.docx.n1n1n1 and so on.
NinjaLoc is an unfinished cryptographer-extortionist, which is positioned as a workable cryptovirus. Users report a problem with NinjaLoc around the world, with the peak activity of this virus occurring at the end of August. NinjaLoc creates HowtoDecryptYourfiles.txt text file, and also uses a special lock screen that contains information about ransom.