Friday, May 19, 2017

What are The Two Types of Ransomware

  Ransomware is a type of malware that will limit or stop computers users from accessing their system. It will lock your system screen or lock the user’s files until you pay the ransom.There are two types of Ransomware:


1. CRYPTO RANSOMWARE - This is a kind of ransomware that encrypts files on your computers and even your mobile devices . The encryption will scramble the contents of the file. When this is done, your files become illegible. This means it becomes unreadable. You need a decryption key for your device to become normal again. The hacker is holding you as a hostage until you pay the ransom demand. You will see the demand of payment on your screen. When payment is paid, they will give you the decryption key. There are many forms of crypto – ransomware.
   Here are some types of CRYPTO RANSOMWARE:

a. Apocalypse  Ransomware - This ranmsomware encrypts the victim’s file and then it will change the extension of the encrypted files to .encryption files.  The victim now will have to send an email for instructions on how the ransom must be paid. It spreads through spam email.

b. Crypto  Ransomware 2.0 - This ransomware also encrypts the files and it becomes inaccessible. Your files will be all muddled up. This way you cannot get your files back. Your restoration mode and return to previous mode is taken out from the system. Spam campaigns and malvertising are used to distribute this ransomware

c. CryptoLocker Ransomware - This ransomware spreads through infected email attachments and botnets. Botnet is a collection of internet – connected user computers infected by malware that allows computers to be controlled by a bot herder ( operator ). The ransomware encrypts certain types of files that are kept on network drives using RSA public- key cryptography. The key is kept on the malware’s control services. This ransomware will display a message which offers to decrypt the message when payment is made. You are not sure whether the cyber hacker will decrypt the message.

d. Decryption Max Ransomare - It encrypts the file of a victim. It will add .Crypt,.pzdc.extension after each file that was encrypted.  The ransomware will now change the wallpaper of the victim with a snapshot image of how the ransom must be paid so that you can get the key for the encryption.

2. LOCKER RANSOMWARE - It is also known as computer locker. It will not encrypt your files but it will not allow access to your computers and other mobile devices.  It will lock the user interface and then it will order you to pay the ransom. It will leave you very few choices. You could communicate with the hacker ( attacker ) or just pay the ransom.

    Here Are Some Of Forms LOCKER RANSOMWARE:

a. Department Of Justice Ransomware -  This ransomware will create a registry entry. Once this is running on your computer, your device will shut down and your system will be completely locked . You will not be able to do any work or task. This ransomware will order you to pay a certain amount of cash through Paysafe or Moneypak card. This is a big scam and you won’t be able get your money back.

b. Urausy Police Ransomware - Also known as Police Virus or FBI virus ( Trojan ). It will determine the place and country location. It will download a variety of Trojans.  After this is done, it will start creating false notices from a police force in your location. This is usually spread through fake updates and email attachments. Once this gets in to the system of your device, it will show a ransom note page. It will now order you to pay the ransom using money gram, money pak and Bitcoin. You may never get your files back if you don’t pay.  This is another scam.

c. Ophion Locker - It will encrypt  data with ransoms that will differ from country to country. This  ransomware  is dispersed through online advertising campaigns. It will trick you to click on a certain part of a website. When you do this, it takes hold of your computer.




3 Comments:

At February 22, 2021 at 3:50 AM , Blogger brucedens09 said...


I am so fortunate to have attempted contacting hack.truth and his team These hackers has successfully hacked my partner's iPhone so that I can have access to every deleted messages on WhatsApp, Facebook and email. I really appreciate you my hackers and thanks to the people that recommended them to me contact them via. hack.truth77@gmail.com

 
At April 5, 2021 at 7:47 AM , Blogger doron said...

i was lost with no hope for my wife was cheating and had always got away with it because i did not know how or

always too scared to pin anything on her. with the help a friend who recommended me to who help hack her phone,

email, chat, sms and expose her for a cheater she is. I just want to say a big thank you to

SUPERIOR.HACK@GMAIL.COM . am sure someone out there is looking for how to solve his relationship problems, you can also contact him for all sorts of hacking job..he is fast and reliable. you could also text +1 213-295-1376(whatsapp) contact and thank me later

 
At June 4, 2021 at 4:00 AM , Blogger SHEFFIED BARLEY said...

Never met any hacker as discreet and fast like this White Collar Hackers. They are called WhiteHats and they has helped me in multiple ways first was when my ex spouse cheated on me- they got me every information from my spouse phone number and now they are helping me paying my credit cards debts. They have the best hacking tools plus service any one can ever imagine and I recommend him to the world. I am thankful and grateful for the second chance. Honestly, WhiteCollar hackers are life savers please contact them here if you need their swift service Email; WhitehatspytechATcyberservicesDOTcom

 

Post a Comment

Subscribe to Post Comments [Atom]

<< Home