MountLocker ransomware encrypts company and business user data with ChaCha20 + RSA-2048. It then demands a $ 2 million ransom in BTC to get the files back.It gives the hacked company 3 days and threatens to publish the stolen data "all over the Internet" in order to increase pressure on the victim.
Ranzy Locker Ransomware is the successor of Ako Ransomware and ThunderX Ransomware. Update version contains a better encryption as ThunderX decryption tool became available at NoMoreRansom project's website. Beside enhancement in encryption and methods of ex-filtration, and the (now commonplace) use of a public "leak blog" to post victim data for those who do not comply with the ransom demand.
Ako ransomware encrypts the data of computers on the local network running Windows (including Windows 10) using AES, and then requires a ransom of 0.5 to 1 BTC in order to return the files. Ransom amount varies from case to case.
LockBit Ransomware is an emerging threat and growing stronger day by day. It is following the footsteps of REvil and Maze Ransomware by threatening to publicize the user data if the ransom demand is not fulfilled.
Maze ransomware spread through the help of the SpelevoEK exploit. The exploit exploits a vulnerability, CVE-2018-15982 present in the versions of Flash Player 22.214.171.124 and 126.96.36.199. If exploited successfully, the exploit proceeds to automatically download and install the payload of Maze ransomware.