GandCrab is crypto ransomware encrypts user data using AES-256 (CBC mode) encryption algorithm. and RSA-2048 for the key, and then demands a ransom of 1-3 Dash (crypto-currency) to buy GandCrab Decryptor from extortionists and restore files. GandCrab Ransomware appends .GDCB extension to encrypted files. After finishing encryption process virus creates GDCB-DECRYPT.txt file with ransom-demanding content. GandCrab Ransomware stimulates users to pay the ransom by giving limited time period, after the end of which ransom amount doubles.
Rapid Ransomware is encryption virus that encodes user files using AES algorithm. After successful encryption ransomware appends .rapid or .paymeme extensions to affected files. It also creates text files ("!!! README !!!.txt", "! How Recovery Files.txt", "How Recovery Files.txt", "recovery.txt", ) with ransom note and contact e-mails. This version wants 0.4 BitCoins which is around $5000, but we strongly recommend you not to pay money to malefactors, as you can put your bank credentials at risk. Rapid Ransomware also deletes shadow copies of files, so it will be impossible to restore files from shadow copies. However other instructions given on this page can be very useful and help you in your particular case. Follow the guide below to remove Rapid Ransomware and decrypt .rapid or .paymeme files in Windows 10, Windows 8/8.1 or Windows 7.
.java Ransomware is crypto-virus, that belongs to Crysis/Dharma family and appends different variation of .java extensions to affected files. This ransomware uses AES asymmetric cryptography algorithm. Virus target important data such as photos, documents, videos, music, database files, e-mail files.
File Spider Ransomware is crypto-virus, that uses the AES-128 and RSA-2048 encryption algorithm to encrypt user files. After this, ransomware appends .spider extension to affected files and creates HOW TO DECRYPT FILES.url, that opens the browser window with the ransom-demanding message. File Spider Ransomware targets most important user data. These are MS Office documents, OpenOffice, PDF, text files, databases, photos, music, videos, image files, archives, web page files and other web files, educational, application and specialized files, and other files.
Scarab Ransomware is encryption virus, that encodes your files using AES cryptography and appends .scarab extension. Following successful infection and encryption Scarab Ransomware creates IF_YOU_WANT_TO_GET_ALL_YOUR_FILES_BACK_PLEASE_READ_THIS.TXT file. And puts it on the desktop. It demand ransom between $500 and $1000 in BitCoins. Latest versions remove shadow copies of files, restore points and system state backups, not allowing users to restore files using any of this methods. At the moment files hit by Scarab Ransomware are non-decryptable. We will update this article, as soon as decryption tool appears.