Unlock92 Ransomware is dangerous crypto-virus that uses RSA-2048 asymmetric algorithm to encrypt user personal files. Considering the fact, that it uses Russian language in description it mostly targets Eastern European users. However, virus is distributed via public networks and international spam bots and any user can become a victim. Unlock92 Ransomware underwent several major updates and changes.
YYTO Ransomware is new crypto-virus, that encrypt sensitive files on users computers using AES-256 cryptography. Latest version of this ransomware adds .email@example.com suffix to the end of encrypted files. After successful encryption YYTO Ransomware places text files with instructions to pay the ransom on the desktop and in folders with affected files. Instruction files filenames are: help_to_decrypt.txt, read_to_txt_file.yyt, help.txt, encrypt.txt or Readme.txt, depending on the version of ransomware in your case. Ransom amount is between $500 and $1500.
If you are infected with ransomware and you see any of this extension added - that means your files are encrypted with TeslaCrypt 4.2 or earlier versions and your files can be decrypted. To effectively restore your files you need to remove any active process of this ransomware using special removal tools or trying standard antivirus software. After this you need to use special decoders to determine decryption key and get your files back. Follow instructions below to remove TeslaCrypt 4.2 Ransomware and decrypt .vvv or .exx files in Windows 10, Windows 8, Windows 7.
Arena Ransomware is successor of Dharma Ransomware from CrySis crypto-virus family. This malware uses asymmetric cryptography to encrypt users files, such as documents, photos, music, videos, games etc. This version appends .arena extension to affected files. After finishing encryption process various versions of Arena Ransomware can create different text or html files with instructions: FILES ENCRYPTED.txt, info.hta, Your personal data are encrypted!.txt, _HELP_INSTRUCTION.TXT. Ransomware can demand payment from 0.3 to 1 BitCoins (which is equivalent to $2000 - $6000) for decryption services, but usually malefactors don't send any keys.
Losers Ransomware is new variant of Nemesis/Cry36 ransomware family viruses. According to our research it appends .losers and .damoclis (In this case it is called Damoclis Gladius Ransomware) extensions to encrypted files. Ransomware creates HOWTODECRYPTFILES.html file with instructions to pay the ransom and possibly decrypt your files.
Sage 2.2 Ransomware is successor of Sage 2.0 Ransomware and Sage Ransomware based on CryLocker family. It was changed in terms of design of desktop background and payment pages. It also uses new filenames for instructions file and image file (!HELP_SOS.hta and !HELP_SOS.bmp). Virus still adds .sage file extension to encrypted files and uses Microsoft SAPI voice to read the message on your desktop aloud. This is done to create negative psychological effect. Latest version of this ransomware demands 0.17720 BTC or almost $1000 for decryption.
Bad Rabbit is new wide-spread ransomware, that uses RSA-2048 and AES cryptography. It mostly targets enterprises in Eastern Europe. Security experts claim, that Bad Rabbit is related to previously distributed Petya и NotPetya viruses. Currently, several governmental institutions and banks were attacked by this virus in Russia, Ukraine, Turkey, Germany. Hackers demand ransom of 0.05 BTC (BitCoins), which is ~280$ and threaten to increase this amount if not paid within certain time gap. We strongly recommend not to send money, as in most cases malefactors do not send keys.
Ykcol is new ransomware virus from Locky ransomware family. It uses RSA-2048 and AES-128 cryptography to encrypt user data. After encryption ransomware appends .ykcol extension to all affected files and modifies filenames using certain pattern. Malware changes filenames to random combination of 36 letters with the following sequence: [8_random_letters]-[4_random_letters]-[4_random_letters]-[8_random_letters]-[12_random_letters].ykcol. Malefactors offer users to decrypt their files for 0.15 BTC (Bitcoins) or ~290$. As a rule, no decryption key is sent after the payment. Malware also creates 3 files: Ykcol.html, Ykcol_[4_digit_number].html, and Ykcol.bmp.
BTCWare Ransomware is a big family of ransomware, the successor of Crptxxx Ransomware. Latest versions of BTCWare use AES-192 encryption. This malware encrypts most types of documents, music, photos in user folders and adds various extensions to encrypted files. Originally it was .btcware suffix. Latest version use .cryptobyte, .cryptowin and .theva extensions.
How to remove Amnesia Ransomware and decrypt .amnesia, .@decrypt_files2017, .firstname.lastname@example.org and .TRMT files
Amnesia Ransomware is another ransomware virus, that encrypts documents, photos, music and other types of personal user files. Virus was written in Delphi programming language. Earlier versions of Amnesia use AES-256 encryption, latest versions use AES-128. After encryption most variants of Amnesia append .amnesia or .TRMT extensions to affected files.