Pysa Ransomware, also know by its former name Mespinoza Ransomware is typically distributed via malspam, malvertising campaign, exploit kits, drive-by downloads, and brute-forcing accounts on servers that have RDP exposed to the Internet. Pysa encrypts data using AES-256 the keys for which are then encrypted with RSA.
MountLocker ransomware encrypts company and business user data with ChaCha20 + RSA-2048. It then demands a $ 2 million ransom in BTC to get the files back.It gives the hacked company 3 days and threatens to publish the stolen data "all over the Internet" in order to increase pressure on the victim.
Ranzy Locker Ransomware is the successor of Ako Ransomware and ThunderX Ransomware. Update version contains a better encryption as ThunderX decryption tool became available at NoMoreRansom project's website. Beside enhancement in encryption and methods of ex-filtration, and the (now commonplace) use of a public "leak blog" to post victim data for those who do not comply with the ransom demand.
Ako ransomware encrypts the data of computers on the local network running Windows (including Windows 10) using AES, and then requires a ransom of 0.5 to 1 BTC in order to return the files. Ransom amount varies from case to case.
LockBit Ransomware is an emerging threat and growing stronger day by day. It is following the footsteps of REvil and Maze Ransomware by threatening to publicize the user data if the ransom demand is not fulfilled.