All known lockers list

Click on the "Details" button to learn more about each ransomware representative on this page

777

.777 is a file-encrypting ransomware-type virus. This malware uses asymmetric encryption to encrypt victims' files. During encryption, .777 ransomware generates two keys - public and private (public to encrypt files, private to decrypt). Note that ...

Details

8LOCK8

The 8lock8 Ransomware is very similar to HiddenTear, which is an open source ransomware threat that has been linked to a wide variety of other ransomware attacks. Threats related to the 8lock8 Ransomware and HiddenTear tend to share characteristics in ...

Details

AL-NAMROOD

Al-Namrood is a newly-discovered ransomware designed to encrypt files. During encryption, Al-Namrood appends the ".unavailable" extension to the name of each compromised file (e.g., "sample.jpg" is renamed to "sample.jpg.unavailable"). In addition, ...

Details

APOCALYPSE

gulThe Apocalypse ransomware was first seen on the 9th May. The main attack vector is weak passwords on insecurely configured Windows servers running the remote desktop service. This allows an attacker to use brute force to gain access and means they ...

Details

FORTRYPT

Win32/Fortrypt can be downloaded by other malware and may be dropped with the following file name: bin.exe The threat drops and runs a randomly named batch file in the current folder (detected as Trojan:BAT/Fortrypt.A) which might delete all shadow ...

Details

CERBER

Cerber has a wide distribution, due in part to its successful use of leading exploit kits. By monitoring the actual C&C communications, we were able to create a complete view of the ransomware’s activity. Cerber is currently running 161 active campaigns, ...

Details

FENIXLOCKER

FenixLocker is another ransomware-type virus that encrypts files using AES cryptography. During encryption, FenixLocker appends the names of compromised files with the ".centrumfr@india.com" extension (e.g., "sample.jpg" is renamed to ...

Details

LOCKY

What is Locky ransomware? Locky ransomware was discovered in the end of 2015 year, it encrypts files on your computer and then demands a ransom fee to decrypt these files. There are several differences from other ransomware viruses. Locky not only ...

Details

PRINCESS

PrincessLocker ransomware has appeared some time ago and has drawn out attention by using the same template of the site for a victim as Cerber did. It is not a widespread ransomware, so it has taken some time before we got our hands on a sample. In this ...

Details

SUPERCRYPT

In the middle of October, reports have been coming into this topic about a new ransomware that encrypts local data and data on mapped drives. Once a file is encrypted it will change their extension to .SUPERCRYPT and leave a ransom note titled ...

Details

SURPRISE

AES encryption algorithm is being used by a ransomware virus, named SuperCrypt which encrypts the files of it’s victims. The virus has been reported to also add the .SUPERCRYPT file extension to the files which it enciphers. The enciphered files can no ...

Details

TOVICRYPT

We have seen this ransomware share the same distribution used by Win32/Exxroute family of ransomware mainly through exploits. This ransomware may arrive as a malicious DLL and run under the %TEMP% folder using the name rad[randomhex].tmp.dll through ...

Details

Don't stay alone when your data is encrypted - get support of our community, useful tips and the perfect cure for your PC!

decryptornot@protonmail.com

Recommended Products:

Copyright © 2015-2016

DECRYPT or NOT
All Rights Reserved

Terms of Use | Privacy Policy