.cypher Files Virus – How to Remove and Recover Your Files

.cypher Files Virus – How to Remove and Recover Your Files

This article has been created in order to explain what is the .cypher files virus and how to remove it from your computer system plus how to restore files, that have been encrypted by it without having to pay the ransom.

The ransomware infection, known as the .cypher files virus has been reported to infect victims via an .exe file, which immediately begins to encrypt the important files on their computers and then the malware may demand a ransom payoff from it’s victims to get the files to become accessible again. In the event that your computer has been infected by the .cypher ransomware infection, we advise you to read the following article in order to understand what is this infection and how to remove it from your computer, plus how to try and recover your files without paying the ransom.

Threat Summary

Name.cypher Files Virus
TypeRansomware, Cryptovirus
Short DescriptionThe .cypher files virus aims to encrypt the files on the infected computer with a possible goal to get the victim to pay a hefty ransom (1 BitCoin) to decrypt the encrypted files.
SymptomsThe main symptom after this virus runs on your PC is the files having the .cypher file extension added.
Distribution MethodSpam Emails, Email Attachments, Executable files
Detection Tool See If Your System Has Been Affected by .cypher Files Virus


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss .cypher Files Virus.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

.cypher Ransomware – Update December 2018

December 2018 brings an update for .cypher Ransomware. It appears that the ransomware still encrypts files by adding the same extension to them, but has a new ransom note. You can preview it from the screenshot provided below:

The ransom note message states the following:

Your files have been encrypted.

To decrypt your files, follow the instructions

Open your explorer, in the pathbar, enter %appdata%

Find the file encryption_key and send it to to email: [email protected] or [email protected]

Await payment instructions.

The note is shorter, but the cybercriminals want you to write an email so you could get further instructions.

.cypher Ransomware – Spread

The main method which accounts to more than 80% of the ransomware viruses out there for propagation is reported to be e-mail spam. The spammed messages may directly contain the infection file of this virus, masked as a legitimate Microsoft Office document, an Invoice, a banking receipt, or any other form of order confirmation or documents of importance. Such e-mails are often sent and accompanied by various different types of deceitful messages that aim to deceive you that the attachment is important, for example:

In addition to via e-mail, the .cypher ransomware may also be spread by being uploaded as a seemingly legitimate file, like a fake setup of a program, a license activator or a game patch or crack. Such files are often uploaded on suspicious sites, from the likes of torrent websites, or software providing sites with low rating.

.cypher Ransomware – More Information

After it infects your computer, .cypher files virus drops an executable type of file on your computer which has a random A-Z, a-z, 0-9 name and has the following parameters, according to analysis at reverse.it.

When the malicious file is finally executed, it may begin to drop the ransom note of the virus, named README_.txt. It has the following message for the victims of this malware:

Your files have been encrypted!
To decrypt your files, send 1.0 Bitcoin to this address: {BTC Address}
Affter your payment is complete, you can decrypt files with decryption program.
Download decryption program here.
Payment status: Not paid yet.
Question: Where can I get BitCoin wallet?
Answer: Simple and easy to use wallet.
Question: Where can I buy Bitcoins?
Answer: Guide to various methods of buying Bitcoin.

Then, the .cypher malware begins to read the computer name, by chedking the registry entry “COMPUTERNAME”:


In addition to this, the malware drops over 2000 different files and furthermore, it also deletes the following system files:

→ “%PROGRAMFILES%\Adobe\Reader 11.0\Reader\IDTemplates\DEU\AdobeID.pdf”
“C:\Program Files\Adobe\Reader 11.0\Reader\IDTemplates\DEU\DefaultID.pdf”
“C:\Program Files\Adobe\Reader 11.0\Reader\IDTemplates\ENU\AdobeID.pdf”
“C:\Program Files\Adobe\Reader 11.0\Reader\IDTemplates\ENU\DefaultID.pdf”
“C:\Program Files\Adobe\Reader 11.0\Reader\PDFSigQFormalRep.pdf”
“C:\Program Files\Adobe\Reader 11.0\Reader\plug_ins\Annotations\Stamps\DEU\Dynamic.pdf”
“C:\Program Files\Adobe\Reader 11.0\Reader\plug_ins\Annotations\Stamps\DEU\SignHere.pdf”
“C:\Program Files\Adobe\Reader 11.0\Reader\plug_ins\Annotations\Stamps\DEU\StandardBusiness.pdf”
“C:\Program Files\Adobe\Reader 11.0\Reader\plug_ins\Annotations\Stamps\ENU\Dynamic.pdf”
“C:\Program Files\Adobe\Reader 11.0\Reader\plug_ins\Annotations\Stamps\ENU\SignHere.pdf”
“C:\Program Files\Adobe\Reader 11.0\Reader\plug_ins\Annotations\Stamps\ENU\StandardBusiness.pdf”
“C:\Program Files\Adobe\Reader 11.0\Reader\plug_ins\Annotations\Stamps\Words.pdf”
“C:\Program Files\Adobe\Reader 11.0\Resource\ENUtxt.pdf”
“C:\Program Files\Adobe\Reader 11.0\Resource\TypeSupport\Unicode\Mappings\Adobe\symbol.txt”
“C:\Program Files\Adobe\Reader 11.0\Resource\TypeSupport\Unicode\Mappings\Adobe\zdingbat.txt”
“C:\Program Files\AutoIt3\AutoItX\Examples\C++\_readme.txt”
“C:\Program Files\AutoIt3\AutoItX\Examples\VBScript\_readme.txt”
“C:\Program Files\AutoIt3\Examples\COM\Worksheet.xls”

Then, the ransomware virus drops the following types of files on the victim’s computer:

→ “ReadMe.txt.cypher”
[email protected][1].txt.cypher”
[email protected][2].txt.cypher

In addition to this, the ransomware virus may also begin to execute Windows Command Prompt script which begins to encrypt the files on the infected computer.

.cypher Files Virus – Encryption Process

The encryption process of this ransowmare is conducted via a script which scans for the important files on the victim’s PC, such as:

  • Documents.
  • Audio files.
  • Videos.
  • Images.
  • Archives.

The malware also immediately adds it’s distinctive .cypher file extension to the encrypted files, making them appear like the image below displays:

Remove .cypher Ransomware and Restore Encrypted Files

In order to delete this ransomware infection, we advise that you follow the removal instructions down below. They are specifically designed in order to help you to remove the .cypher virus either manually or automatically. If you lack the experience in removing malware, like .cypher ransomware manually, experts always recommend using an advanced anti-malware software to delete this virus automatically and to protect your computer in real-time against threats in the future.

If you want to restore files that have been encrypted with the .cypher file extension, we advise you to follow step “2. Restore files encrypted by .cypher Files Virus”. They may not be 100% guarantee you will recover all of the files, but with their aid, you may restore most of your important documents.

Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share