Scarab-Crypto is a parallel version of the Scarab Ransomware, which can cause troubles for users. The main purpose of such viruses is to encrypt most important files on user's machine and to require a ransom from victims. Antiviruses without real-time internet protection are useless against Scarab-Crypto. A malicious program has unique symptoms: firstly, every encrypted file got a .crypto suffix using the AES. Coded files are impossible to view and edit.
BlackRuby2 Ransomware is a second edition of wide-spread BlackRuby Ransomware virus based on InfiniteTear. It encrypts files using symmetric or asymmetric cryptography (AES encryption) and appends .BlackRuby2 (.BlackRuby-2) extension. Malware also modifies filename with certain template, and as a result, affected files look like this: Encrypted_[random_letters].BlackRuby2. BlackRuby2 Ransomware demands ransom in BitCoins. The previous version asked for $650. It checks the presence of following anti-viruses in the system: Avast, Avira, COMODO, Kaspersky Lab, McAfee, Symantec. Uses services to locate the user's PC, up to the city. BlackRuby2, in comparison to the first version, also spreads in following countries: Afghanistan (AF), Armenia (AM), Azerbaijan (AZ), Iran (IR), (Iraq) IQ, Pakistan (PK), Turkey (TR), Turkmenistan ( TM).
Infected with Sigma Ransomware? Need to decrypt your files? What is Sigma Ransomware Sigma Ransomware is a high-risk virus. Ransomware uses AES and RSA algorithms to encrypt user files and add a random extension to affected files. Actually, it appends…
Arrow Ransomware is a new version of encryption virus from notorious Dharma/Crysis ransomware family. Ransomware uses AES and RSA algorithms to encrypt user files and add .arrow extension to affected files. Actually, it appends a complex suffix, that looks like this: .id-{8-symbols-alphanumeric-id}-{e-mail}.arrow. Ransom is 0.1 BitCoin, that currently equals to ~$1000. However, this amount may vary depending on cryptocurrency exchange rate. Arrow Ransomware targets most important user data, which makes it effective for malefactors. These are MS Office documents, OpenOffice, PDF, text files, databases, photos, music, videos, image files, archives, web page files and other web files, educational, application and specialized files, and other files.
GandCrab2 is a successor of previous wide-spread ransomware-type virus GandCrab. This virus encrypts user data using AES-256 and RSA-2048 encryption algorithms. GandCrab2 Ransomware appends .CRAB extension to affected files. Following successful encryption ransomware demands ~$400 in Dash cryptocurrency. Ransom note also states, that this amount will double, if not paid in 48 hours.