Remove Cossy ransomware (Tutorial) - Virus Removal Instructions

removal by Julie Splinters - - | Type: Ransomware

Cossy virus Removal Guide

What is Cossy ransomware?

Cossy ransomware – a Russian file locking virus which uses the RSA-2048 code to encrypt data

Cossy ransomwareCossy ransomware is a file locking cyber threat which encrypts important documents by using the RSA-2048 encryption algorithm.

Cossy ransomware is a Russian cryptolocker which uses a unique encryption code to block various documents that are stored on the infected computer. This cyber threat uses RSA-2048 encryption[1] and ads the .Защищено RSA-2048 and .Protected by RSA-2048 appendixes to most of the files, while executables appear with the .lnk.Protected by RSA-2048 extension added. Moreover, Cossy virus brings a file named Cossy.exe from which you can spot the infection. As we can see from the ransom note, this dangerous cryptovirus is mostly targeting Russian-speaking users as the message is written in the Russian language. The crooks have been offering five small files for free decryption and urging for 50 rubles in BTC as the ransom price. After the money is received, they promise to send the decryption tool, however, such promises often appear to be false.

Name Cossy
Type Ransomware
Appendixes added .lnk.Protected by RSA-2048 – for executables, .Protected by RSA-2048 and .Защищено RSA-2048 – for other files
Encryption algorithm used RSA-2048
Target Russian speakers
Ransom price 50 rubles in BTC
Given email grafimatriux72224733@protonmail.com
Distribution Spam messages and their attachments, rogue links, and files, etc.
Removal Delete the virus automatically. Use ReimageIntego to detect malware content

Here is the Cossy ransomware ransom message translated into the English language:

Hello dear friend! Yes, I’m a mean greedy but I have to say it …
forgive …
but …….
all your files ___
SAFE! 1 !! 11 !! 11! 1: DDDDDDDDD
Algorithm RSA! 2048 bits! 4096 too lazy!
It is based on primes it.
I'll tell you just now.
Write to grafimatriux72224733@protonmail.com .
We provide: Free transcript. Paid decryption (and Contractual decryption) *
Contractual decryption is if you have old-time files that have been saved for many years, the decoder is provided free of charge.
Paid decryption costs – 50 rubles in bitcoins, the wallet will be made unique for you. *
You can decrypt 5 files with a size of 5 MB or less for free.
I will not kid you, + give when paying tips to improve the security and deciphering instructions. ”
* – Services provided to us if you write a letter to the file is extremely important infa.RSA-2048 File

The crooks provide grafimatriux72224733@protonmail.com email address as a way to show contact. However, we advise avoiding any relations with the cybercriminals as these people cannot be trusted. Furthermore, you should remove Cossy virus from the computer system permanently. For this purpose, use reliable anti-malware software only. Additionally, we suggest downloading and installing a tool such as ReimageIntego to detect all malware-laden content that might be secretly hidden.

Cossy ransomware removal is necessary if wanted to avoid possible damaging consequences. Such cyber threats are capable of many things. For example, modifying the Windows operating system[2] and adding rogue components to it. Furthermore, the ransomware virus can inject dubious entries straight into the Registry. Such changes let the damaging virus to perform its activities and activate the encryption process.

Additionally, Cossy ransomware can inject other malware-related programs, one of which might be a Trojan horse[3] infection. Once your computer is infected with ransomware, its security level decreases and other infections become more capable of entering the system unnoticed. Furthermore, in some case, a ransomware infection can relate in the deactivation of antivirus or firewall security programs. This means, that the virus can operate without being caught.

One more thing you need to know about ransomware viruses is that these threats can encrypt that data which is stored only on the infected computer. Note that, if you decide to keep valuable documents on a remote server, the viruses such as Cossy ransomware will not be able to reach it, unless you keep it plugged often. So, better get rid of the ransomware as soon as you spot encrypted files and manage to take care of your information next time.

Cossy virusCossy virus - ransomware which targets Russian-speaking people.

Ransomware distribution techniques

According to malware experts,[4] if a ransomware infection has entered your computer system, it can have happened in a few ways. Ransomware viruses are capable of spreading via spam messages and their rogue files, malicious links from third-party websites. Good news, you can avoid this malware, however, you will need to take some actions of your own:

  • Avoid opening unknown emails, especially, their rogue attachments. Crooks often drop malware-laden email messages straight to the victims' email boxes. So, be careful while opening emails, make sure they come from recognizable senders.
  • Stay away from secondary websites. These pages, especially P2P networks, can lack required protections and include malicious links or files. If you accidentally access such content, your computer system can easily get infected with a ransomware virus.
  • Install computer security. Do not be afraid to invest in a reliable antivirus tool. These automatical programs are capable of protecting the system from malicious programs and various computer-related issues.

Get rid of Cossy virus

If the ransomware infection has appeared on your computer, make sure that you get rid of it ASAP. We recommend using a tool such as ReimageIntego, SpyHunter 5Combo Cleaner, or Malwarebytes to detect all components that are related to the cyber threat. Once you remove Cossy virus, make sure that all virus-related content was eliminated successfully. Furthermore, you can perform system backups to disable all active components.

Performing the Cossy ransomware removal requires lots of the user's attention. This is the main reason why the cyber threat cannot be removed manually. If you decide to eliminate the ransomware virus on your own, you can cause even more damage for your computer system or miss some rogue components that might be secretly hidden. Additionally, take a look at our below-provided data recovery steps.

Offer
do it now!
Download
Reimage Happiness
Guarantee
Download
Intego Happiness
Guarantee
Compatible with Microsoft Windows Compatible with macOS
What to do if failed?
If you failed to remove virus damage using Reimage Intego, submit a question to our support team and provide as much details as possible.
Reimage Intego has a free limited scanner. Reimage Intego offers more through scan when you purchase its full version. When free scanner detects issues, you can fix them using free manual repairs or you can decide to purchase the full version in order to fix them automatically.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Reimage, try running SpyHunter 5.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Intego, try running Combo Cleaner.

Getting rid of Cossy virus. Follow these steps

Manual removal using Safe Mode

Use Safe Mode with Networking to disable the ransomware virus on your computer:

Important! →
Manual removal guide might be too complicated for regular computer users. It requires advanced IT knowledge to be performed correctly (if vital system files are removed or damaged, it might result in full Windows compromise), and it also might take hours to complete. Therefore, we highly advise using the automatic method provided above instead.

Step 1. Access Safe Mode with Networking

Manual malware removal should be best performed in the Safe Mode environment. 

Windows 7 / Vista / XP
  1. Click Start > Shutdown > Restart > OK.
  2. When your computer becomes active, start pressing F8 button (if that does not work, try F2, F12, Del, etc. – it all depends on your motherboard model) multiple times until you see the Advanced Boot Options window.
  3. Select Safe Mode with Networking from the list. Windows 7/XP
Windows 10 / Windows 8
  1. Right-click on Start button and select Settings.
    Settings
  2. Scroll down to pick Update & Security.
    Update and security
  3. On the left side of the window, pick Recovery.
  4. Now scroll down to find Advanced Startup section.
  5. Click Restart now.
    Reboot
  6. Select Troubleshoot. Choose an option
  7. Go to Advanced options. Advanced options
  8. Select Startup Settings. Startup settings
  9. Press Restart.
  10. Now press 5 or click 5) Enable Safe Mode with Networking. Enable safe mode

Step 2. Shut down suspicious processes

Windows Task Manager is a useful tool that shows all the processes running in the background. If malware is running a process, you need to shut it down:

  1. Press Ctrl + Shift + Esc on your keyboard to open Windows Task Manager.
  2. Click on More details.
    Open task manager
  3. Scroll down to Background processes section, and look for anything suspicious.
  4. Right-click and select Open file location.
    Open file location
  5. Go back to the process, right-click and pick End Task.
    End task
  6. Delete the contents of the malicious folder.

Step 3. Check program Startup

  1. Press Ctrl + Shift + Esc on your keyboard to open Windows Task Manager.
  2. Go to Startup tab.
  3. Right-click on the suspicious program and pick Disable.
    Startup

Step 4. Delete virus files

Malware-related files can be found in various places within your computer. Here are instructions that could help you find them:

  1. Type in Disk Cleanup in Windows search and press Enter.
    Disk cleanup
  2. Select the drive you want to clean (C: is your main drive by default and is likely to be the one that has malicious files in).
  3. Scroll through the Files to delete list and select the following:

    Temporary Internet Files
    Downloads
    Recycle Bin
    Temporary files

  4. Pick Clean up system files.
    Delete temp files
  5. You can also look for other malicious files hidden in the following folders (type these entries in Windows Search and press Enter):

    %AppData%
    %LocalAppData%
    %ProgramData%
    %WinDir%

After you are finished, reboot the PC in normal mode.

Remove Cossy using System Restore

Activate the System Restore feature by following these instructions and disable the dangerous activities:

  • Step 1: Reboot your computer to Safe Mode with Command Prompt
    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Command Prompt from the list Select 'Safe Mode with Command Prompt'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window. Select 'Enable Safe Mode with Command Prompt'
  • Step 2: Restore your system files and settings
    1. Once the Command Prompt window shows up, enter cd restore and click Enter. Enter 'cd restore' without quotes and press 'Enter'
    2. Now type rstrui.exe and press Enter again.. Enter 'rstrui.exe' without quotes and press 'Enter'
    3. When a new window shows up, click Next and select your restore point that is prior the infiltration of Cossy. After doing that, click Next. When 'System Restore' window shows up, select 'Next' Select your restore point and click 'Next'
    4. Now click Yes to start system restore. Click 'Yes' and start system restore
    Once you restore your system to a previous date, download and scan your computer with ReimageIntego and make sure that Cossy removal is performed successfully.

Bonus: Recover your data

Guide which is presented above is supposed to help you remove Cossy from your computer. To recover your encrypted files, we recommend using a detailed guide prepared by 2-spyware.com security experts.

You can recover files encrypted by Cossy ransomware by looking thru the below-given data recovery methods. Make sure you choose the most suitable option and complete each step as required.

If your files are encrypted by Cossy, you can use several methods to restore them:

Using Windows Previous Versions feature might allow you to restore some files:

If you have activated the System Restore feature in the past, this method might appear to be very useful.

  • Find an encrypted file you need to restore and right-click on it;
  • Select “Properties” and go to “Previous versions” tab;
  • Here, check each of available copies of the file in “Folder versions”. You should select the version you want to recover and click “Restore”.

Shadow Explorer might be helpful for data restoring:

Note that, this method might work only under one condition. You need to ensure that the ransomware virus did not eliminate Shadow Volume Copies of encrypted files.

  • Download Shadow Explorer (http://shadowexplorer.com/);
  • Follow a Shadow Explorer Setup Wizard and install this application on your computer;
  • Launch the program and go through the drop down menu on the top left corner to select the disk of your encrypted data. Check what folders are there;
  • Right-click on the folder you want to restore and select “Export”. You can also select where you want it to be stored.

Finally, you should always think about the protection of crypto-ransomwares. In order to protect your computer from Cossy and other ransomwares, use a reputable anti-spyware, such as ReimageIntego, SpyHunter 5Combo Cleaner or Malwarebytes

How to prevent from getting ransomware

Choose a proper web browser and improve your safety with a VPN tool

Online spying has got momentum in recent years and people are getting more and more interested in how to protect their privacy online. One of the basic means to add a layer of security – choose the most private and secure web browser. Although web browsers can't grant full privacy protection and security, some of them are much better at sandboxing, HTTPS upgrading, active content blocking, tracking blocking, phishing protection, and similar privacy-oriented features. However, if you want true anonymity, we suggest you employ a powerful Private Internet Access VPN – it can encrypt all the traffic that comes and goes out of your computer, preventing tracking completely.

 

Lost your files? Use data recovery software

While some files located on any computer are replaceable or useless, others can be extremely valuable. Family photos, work documents, school projects – these are types of files that we don't want to lose. Unfortunately, there are many ways how unexpected data loss can occur: power cuts, Blue Screen of Death errors, hardware failures, crypto-malware attack, or even accidental deletion.

To ensure that all the files remain intact, you should prepare regular data backups. You can choose cloud-based or physical copies you could restore from later in case of a disaster. If your backups were lost as well or you never bothered to prepare any, Data Recovery Pro can be your only hope to retrieve your invaluable files.

About the author
Julie Splinters
Julie Splinters - Malware removal specialist

If this free removal guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Julie Splinters
About the company Esolutions

References
Removal guides in other languages