TeslaCrypt

The files targeted involve the save data, player profiles, custom maps and game mods stored on the victim's hard drives.

Newer variants of TeslaCrypt were not focused on computer games alone but also encrypted Word, PDF, JPEG and other files.

In all cases, the victim would then be prompted to pay a ransom of $500 worth of bitcoins in order to obtain the key to decrypt the files.

[10] By November 2015, security researchers from Kaspersky had been quietly circulating that there was a new weakness in version 2.0, but carefully keeping that knowledge away from the malware developer so that they could not fix the flaw.

[14] After a few days, ESET released a public tool to decrypt affected computers at no charge.