Epsilon ransomware encrypts user data with AES + RSA and then demands user to mail EpsilonCrypt@tutanota.com for ransom payments and file recovery.
Hentai Oniichan Ransomware encrypts user data with Rijndael and then demands a 10 BTC to 50 BTC ransom to get the files back.
Chastitylock Ransomware locks Cellmate Chastity Device that is controlled via Qiui Bluetooth App. Attacker was able to exploit an Direct Object Reference Vulnerability in the API that can..
Chinese hackers moves in to lucrative market of ransomwares and Polar Ransomware is the choice of APT27. It use randomly generated key using AES + RSA 1024.
Babuk Locker Ransomware uses its own implementation of SHA256 hashing, ChaCha8 encryption, and Elliptic-curve Diffie–Hellman (ECDH) key generation and exchange algorithm to encrypt victim files and protection of the encryption keys.