Severity scale:  

Remove Cossy ransomware (Tutorial) - Virus Removal Instructions

removal by Julie Splinters - - | Type: Ransomware

Cossy ransomware – a Russian file locking virus which uses the RSA-2048 code to encrypt data

Cossy ransomware

Cossy ransomware is a Russian cryptolocker which uses a unique encryption code to block various documents that are stored on the infected computer. This cyber threat uses RSA-2048 encryption[1] and ads the .Защищено RSA-2048 and .Protected by RSA-2048 appendixes to most of the files, while executables appear with the .lnk.Protected by RSA-2048 extension added. Moreover, Cossy virus brings a file named Cossy.exe from which you can spot the infection. As we can see from the ransom note, this dangerous cryptovirus is mostly targeting Russian-speaking users as the message is written in the Russian language. The crooks have been offering five small files for free decryption and urging for 50 rubles in BTC as the ransom price. After the money is received, they promise to send the decryption tool, however, such promises often appear to be false.

Name Cossy
Type Ransomware
Appendixes added .lnk.Protected by RSA-2048 – for executables, .Protected by RSA-2048 and .Защищено RSA-2048 – for other files
Encryption algorithm used RSA-2048
Target Russian speakers
Ransom price 50 rubles in BTC
Given email
Distribution Spam messages and their attachments, rogue links, and files, etc.
Removal Delete the virus automatically. Use ReimageIntego to detect malware content 

Here is the Cossy ransomware ransom message translated into the English language:

Hello dear friend! Yes, I’m a mean greedy but I have to say it … 
forgive … 
but ……. 
all your files ___ 
SAFE! 1 !! 11 !! 11! 1: DDDDDDDDD 
Algorithm RSA! 2048 bits! 4096 too lazy! 
It is based on primes it. 
I'll tell you just now. 
Write to . 
We provide: Free transcript. Paid decryption (and Contractual decryption) * 
Contractual decryption is if you have old-time files that have been saved for many years, the decoder is provided free of charge.
Paid decryption costs – 50 rubles in bitcoins, the wallet will be made unique for you. * 
You can decrypt 5 files with a size of 5 MB or less for free. 
I will not kid you, + give when paying tips to improve the security and deciphering instructions. ” 
* – Services provided to us if you write a letter to the file is extremely important infa.RSA-2048 File

The crooks provide email address as a way to show contact. However, we advise avoiding any relations with the cybercriminals as these people cannot be trusted. Furthermore, you should remove Cossy virus from the computer system permanently. For this purpose, use reliable anti-malware software only. Additionally, we suggest downloading and installing a tool such as ReimageIntego to detect all malware-laden content that might be secretly hidden.

Cossy ransomware removal is necessary if wanted to avoid possible damaging consequences. Such cyber threats are capable of many things. For example, modifying the Windows operating system[2] and adding rogue components to it. Furthermore, the ransomware virus can inject dubious entries straight into the Registry. Such changes let the damaging virus to perform its activities and activate the encryption process.

Additionally, Cossy ransomware can inject other malware-related programs, one of which might be a Trojan horse[3] infection. Once your computer is infected with ransomware, its security level decreases and other infections become more capable of entering the system unnoticed. Furthermore, in some case, a ransomware infection can relate in the deactivation of antivirus or firewall security programs. This means, that the virus can operate without being caught.

One more thing you need to know about ransomware viruses is that these threats can encrypt that data which is stored only on the infected computer. Note that, if you decide to keep valuable documents on a remote server, the viruses such as Cossy ransomware will not be able to reach it, unless you keep it plugged often. So, better get rid of the ransomware as soon as you spot encrypted files and manage to take care of your information next time.

Cossy virusCossy virus - ransomware which targets Russian-speaking people.

Ransomware distribution techniques

According to malware experts,[4] if a ransomware infection has entered your computer system, it can have happened in a few ways. Ransomware viruses are capable of spreading via spam messages and their rogue files, malicious links from third-party websites. Good news, you can avoid this malware, however, you will need to take some actions of your own:

  • Avoid opening unknown emails, especially, their rogue attachments. Crooks often drop malware-laden email messages straight to the victims' email boxes. So, be careful while opening emails, make sure they come from recognizable senders.
  • Stay away from secondary websites. These pages, especially P2P networks, can lack required protections and include malicious links or files. If you accidentally access such content, your computer system can easily get infected with a ransomware virus.
  • Install computer security. Do not be afraid to invest in a reliable antivirus tool. These automatical programs are capable of protecting the system from malicious programs and various computer-related issues.

Get rid of Cossy virus

If the ransomware infection has appeared on your computer, make sure that you get rid of it ASAP. We recommend using a tool such as ReimageIntego, SpyHunter 5Combo Cleaner, or Malwarebytes to detect all components that are related to the cyber threat. Once you remove Cossy virus, make sure that all virus-related content was eliminated successfully. Furthermore, you can perform system backups to disable all active components.

Performing the Cossy ransomware removal requires lots of the user's attention. This is the main reason why the cyber threat cannot be removed manually. If you decide to eliminate the ransomware virus on your own, you can cause even more damage for your computer system or miss some rogue components that might be secretly hidden. Additionally, take a look at our below-provided data recovery steps.

do it now!
Reimage Happiness
Intego Happiness
Compatible with Microsoft Windows Supported versions Compatible with OS X Supported versions
What to do if failed?
If you failed to remove virus damage using Reimage Intego, submit a question to our support team and provide as much details as possible.
Reimage Intego has a free limited scanner. Reimage Intego offers more through scan when you purchase its full version. When free scanner detects issues, you can fix them using free manual repairs or you can decide to purchase the full version in order to fix them automatically.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Reimage, try running SpyHunter 5.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Intego, try running Combo Cleaner.

To remove Cossy virus, follow these steps:

Remove Cossy using Safe Mode with Networking

Use Safe Mode with Networking to disable the ransomware virus on your computer:

  • Step 1: Reboot your computer to Safe Mode with Networking

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Safe Mode with Networking from the list Select 'Safe Mode with Networking'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Networking in Startup Settings window. Select 'Enable Safe Mode with Networking'
  • Step 2: Remove Cossy

    Log in to your infected account and start the browser. Download ReimageIntego or other legitimate anti-spyware program. Update it before a full system scan and remove malicious files that belong to your ransomware and complete Cossy removal.

If your ransomware is blocking Safe Mode with Networking, try further method.

Remove Cossy using System Restore

Activate the System Restore feature by following these instructions and disable the dangerous activities:

  • Step 1: Reboot your computer to Safe Mode with Command Prompt

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Command Prompt from the list Select 'Safe Mode with Command Prompt'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window. Select 'Enable Safe Mode with Command Prompt'
  • Step 2: Restore your system files and settings
    1. Once the Command Prompt window shows up, enter cd restore and click Enter. Enter 'cd restore' without quotes and press 'Enter'
    2. Now type rstrui.exe and press Enter again.. Enter 'rstrui.exe' without quotes and press 'Enter'
    3. When a new window shows up, click Next and select your restore point that is prior the infiltration of Cossy. After doing that, click Next. When 'System Restore' window shows up, select 'Next' Select your restore point and click 'Next'
    4. Now click Yes to start system restore. Click 'Yes' and start system restore
    Once you restore your system to a previous date, download and scan your computer with ReimageIntego and make sure that Cossy removal is performed successfully.

Bonus: Recover your data

Guide which is presented above is supposed to help you remove Cossy from your computer. To recover your encrypted files, we recommend using a detailed guide prepared by security experts.

You can recover files encrypted by Cossy ransomware by looking thru the below-given data recovery methods. Make sure you choose the most suitable option and complete each step as required.

If your files are encrypted by Cossy, you can use several methods to restore them:

Using Windows Previous Versions feature might allow you to restore some files:

If you have activated the System Restore feature in the past, this method might appear to be very useful.

  • Find an encrypted file you need to restore and right-click on it;
  • Select “Properties” and go to “Previous versions” tab;
  • Here, check each of available copies of the file in “Folder versions”. You should select the version you want to recover and click “Restore”.

Shadow Explorer might be helpful for data restoring:

Note that, this method might work only under one condition. You need to ensure that the ransomware virus did not eliminate Shadow Volume Copies of encrypted files.

  • Download Shadow Explorer (;
  • Follow a Shadow Explorer Setup Wizard and install this application on your computer;
  • Launch the program and go through the drop down menu on the top left corner to select the disk of your encrypted data. Check what folders are there;
  • Right-click on the folder you want to restore and select “Export”. You can also select where you want it to be stored.

Finally, you should always think about the protection of crypto-ransomwares. In order to protect your computer from Cossy and other ransomwares, use a reputable anti-spyware, such as ReimageIntego, SpyHunter 5Combo Cleaner or Malwarebytes

Choose a proper web browser and improve your safety with a VPN tool

Online spying has got momentum in recent years and people are getting more and more interested in how to protect their privacy online. One of the basic means to add a layer of security – choose the most private and secure web browser. Although web browsers can't grant full privacy protection and security, some of them are much better at sandboxing, HTTPS upgrading, active content blocking, tracking blocking, phishing protection, and similar privacy-oriented features. However, if you want true anonymity, we suggest you employ a powerful Private Internet Access VPN – it can encrypt all the traffic that comes and goes out of your computer, preventing tracking completely.


Lost your files? Use data recovery software

While some files located on any computer are replaceable or useless, others can be extremely valuable. Family photos, work documents, school projects – these are types of files that we don't want to lose. Unfortunately, there are many ways how unexpected data loss can occur: power cuts, Blue Screen of Death errors, hardware failures, crypto-malware attack, or even accidental deletion.

To ensure that all the files remain intact, you should prepare regular data backups. You can choose cloud-based or physical copies you could restore from later in case of a disaster. If your backups were lost as well or you never bothered to prepare any, Data Recovery Pro can be your only hope to retrieve your invaluable files.

About the author
Julie Splinters
Julie Splinters - Malware removal specialist

If this free removal guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Julie Splinters
About the company Esolutions

Removal guides in other languages

Your opinion regarding Cossy ransomware