Security researchers have found a new ransomware strain that targets computer users. The threat is classified as data locker ransomware as it corrupts essential data stored on infected machines and then asks victims for a ransom payment. Its name comes from the extension it appends to all encrypted files. The colecyrus@mail.com.b007 ransomware infection is further associated with a file Readme.txt dropped on the computer. The file contains ransom message send by colecyrus@mail.com.b007 ransomware authors.
This article aims to help all victims of colecyrus@mail.com.b007 ransomware to deal with its complete removal and reveal alternative options for .colecyrus@mail.com.b007 files recovery.
Threat Summary
Name | Colecyrus@mail.com.b007 |
Type | Ransomware |
Short Description | The ransomware encrypts files on your computer and displays a ransom message afterward. |
Symptoms | The ransomware will encrypt your files and put the extension .colecyrus@mail.com.b007 to them after it finishes its encryption process. |
Distribution Method | Spam Emails, Email Attachments, Compromised Web Pages |
Detection Tool |
See If Your System Has Been Affected by malware
Download
Malware Removal Tool
|
User Experience | Join Our Forum to Discuss Colecyrus@mail.com.b007. |
Data Recovery Tool | Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive. |
How Does Colecyrus@mail.com.b007 Ransomware Infect?
Most of the times ransomware like colecyrus@mail.com.b007 infect systems by dropping a single executable file on the PC. That file can be embedded in word, excel or pdf document and then send to you as an attached file to an email message. This technique is preferred by hackers because it allows them to spoof the email sender name and the address. Thus by impersonating popular business and governmental organizations, they hope to trick you into infecting your device with the ransomware. Another standard way for ransomware payload distribution is web links that redirect to corrupted web pages. Such links are posted in emails, online advertisements, and social media.
What Does Colecyrus@mail.com.b007 Ransomware Do to Your Computer?
Once colecyrus@mail.com.b007 payload is running on the computer, it initiates a sequence of malicious actions to complete the attack. First, it may connect its server to send data about the system and download additional malicious components. Then it may create new files in some essential Windows system folders and then activates its malicious processes.
Probably colecyrus@mail.com.b007 ransomware will access Windows Registry editor to create new values that will enable its payload to start on each system turn on. In addition, the same keys –
Run and RunOnce are likely to be modified after the cypto virus drops its ransom note on the PC. As these keys control all processes that need to start when the Windows is launched and all currently running processes, ransomware uses them to display its ransom note at the end of its infection.
Its ransom note might be situated on the Desktop under the name Readme.txt. What it reads is:
Access to your files was limited.
To return your files you have 72 hours. Write to us.
Our contacts.
Our email: colecyrus@mail.com
ATTENTION. To email (colecyrus@mail.com) write messages only from these e-mail services. From other email services, messages may not be received by us.
Yahoo. https://mail.yahoo.com
Gmail. https://www.google.com
Mail. https://www.mail.com
ATTENTION. We will reply you within 24 hours. If there is no response from us, please send your message again.
Tor email: colecyrus@torbox3uiot6wchz.onion
To register tor e-mail, use the service https://torbox3uiot6wchz.onion
This link opens in tor browser. Link to tor browser https://www.torproject.org/
Send us 3 encrypted files, each no more than 2 MB (only pictures, text documents or shortcuts).
We will decrypt them to you for free, to confirm that we can help you.
Together with the decrypted files you will receive further instructionsYOUR KEY.
***********************************************************
The given time frame aims to make you anxious and urge you to pay the ransom as soon as possible. Even though the demanded amount is not mentioned, it probably needs to be transferred in Bitcoins. For the sake of your security, it is better to avoid any negotiations with the crooks. There is no guarantee that you will receive a working solution for the encrypted files even if you pay the ransom.
Which Are the Files Encrypted by Colecyrus@mail.com.b007 Ransomware?
Like most crypto ransomware colecyrus@mail.com.b007 is likely to have all file types that are frequently used set in its target data list. And the reviewed crypto virus can scan for files with file extensions, associated with the following file types:
- Documents
- Videos
- Audio files
- Pictures
- Archives
The original code of all target files is modified by the ransomware via its built-in encryption module. According to security researchers colecyrus@mail.com.b007 uses AES-ECB or stream cipher to encrypt files. Afterward it marks them all with an extension of the same name .colecyrus@mail.com.b007 and drops a ransom message that provides information on their decryption. The transformation restricts you from opening your files until you apply the decryption key.
How to Remove Colecyrus@mail.com.b007 Ransomware and Restore Files
All steps that will help you to get rid of colecyrus@mail.com.b007 ransomware completely are covered in our detailed removal guide below. You can choose whether you want to remove it manually or automatically. Have in mind that due to the complexity of ransomware code the manual removal of all its files and objects from the infected host can be a hard task even for the tech savvy guys. So if you colecyrus@mail.com.b007 ransomware is still on the system even after you fulfill all steps from the manual removal, be advised to take the automatic approach.
After the removal, you can check the alternative .colecyrus@mail.com.b007 files restore options that we choose for you. You will need to back up all encrypted files before the restore process because if something goes wrong during the restore process, it can be used for the next restore attempts.
Attention! SensorsTechForum strongly recommends that all malware victims should look for assistance only by reputable sources. Many guides out there claim to offer free recovery and decryption for files encrypted by ransomware viruses. Be advised that some of them may only be after your money.
As a site that has been dedicated to providing free removal instructions for ransomware and malware since 2014, SensorsTechForum’s recommendation is to only pay attention to trustworthy sources.
How to recognize trustworthy sources:
- Always check "About Us" web page.
- Profile of the content creator.
- Make sure that real people are behind the site and not fake names and profiles.
- Verify Facebook, LinkedIn and Twitter personal profiles.
- Guide 1: How to Remove Colecyrus@mail.com.b007 from Windows.
- Guide 2: Get rid of Colecyrus@mail.com.b007 from Mac OS X.
How to Remove Colecyrus@mail.com.b007 from Windows.
Step 1: Boot Your PC In Safe Mode to isolate and remove Colecyrus@mail.com.b007





Step 2: Uninstall Colecyrus@mail.com.b007 and related software from Windows
Here is a method in few easy steps that should be able to uninstall most programs. No matter if you are using Windows 10, 8, 7, Vista or XP, those steps will get the job done. Dragging the program or its folder to the recycle bin can be a very bad decision. If you do that, bits and pieces of the program are left behind, and that can lead to unstable work of your PC, errors with the file type associations and other unpleasant activities. The proper way to get a program off your computer is to Uninstall it. To do that:



Step 3: Clean any registries, created by Colecyrus@mail.com.b007 on your computer.
The usually targeted registries of Windows machines are the following:
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
You can access them by opening the Windows registry editor and deleting any values, created by Colecyrus@mail.com.b007 there. This can happen by following the steps underneath:



Before starting "Step 4", please boot back into Normal mode, in case you are currently in Safe Mode.
This will enable you to install and use SpyHunter 5 successfully.
Step 4: Scan for Colecyrus@mail.com.b007 with SpyHunter Anti-Malware Tool
Step 5 (Optional): Try to Restore Files Encrypted by Colecyrus@mail.com.b007.
Ransomware infections and Colecyrus@mail.com.b007 aim to encrypt your files using an encryption algorithm which may be very difficult to decrypt. This is why we have suggested a data recovery method that may help you go around direct decryption and try to restore your files. Bear in mind that this method may not be 100% effective but may also help you a little or a lot in different situations.
Simply click on the link and on the website menus on top, choose Data Recovery - Data Recovery Wizard for Windows or Mac (depending on your OS), and then download and run the tool.
Get rid of Colecyrus@mail.com.b007 from Mac OS X.
Step 1: Uninstall Colecyrus@mail.com.b007 and remove related files and objects
1. Hit the ⇧+⌘+U keys to open Utilities. Another way is to click on “Go” and then click “Utilities”, like the image below shows:
- Go to Finder.
- In the search bar type the name of the app that you want to remove.
- Above the search bar change the two drop down menus to “System Files” and “Are Included” so that you can see all of the files associated with the application you want to remove. Bear in mind that some of the files may not be related to the app so be very careful which files you delete.
- If all of the files are related, hold the ⌘+A buttons to select them and then drive them to “Trash”.
In case you cannot remove Colecyrus@mail.com.b007 via Step 1 above:
In case you cannot find the virus files and objects in your Applications or other places we have shown above, you can manually look for them in the Libraries of your Mac. But before doing this, please read the disclaimer below:
You can repeat the same procedure with the following other Library directories:
→ ~/Library/LaunchAgents
/Library/LaunchDaemons
Tip: ~ is there on purpose, because it leads to more LaunchAgents.
Step 3 (Optional): Try to Restore Files Encrypted by Colecyrus@mail.com.b007.
Ransomware infections and Colecyrus@mail.com.b007 aim to encrypt your files using an encryption algorithm which may be very difficult to decrypt. This is why we have suggested a data recovery method that may help you go around direct decryption and try to restore your files. Bear in mind that this method may not be 100% effective but may also help you a little or a lot in different situations.
Simply click on the link and on the website menus on top, choose Data Recovery - Data Recovery Wizard for Windows or Mac (depending on your OS), and then download and run the tool.
Colecyrus@mail.com.b007 FAQ
What is Colecyrus@mail.com.b007 ransomware and how does it work?
Colecyrus@mail.com.b007 is a ransomware infection - the malicious software that enters your computer silently and blocks either access to the computer itself or encrypt your files.
Many ransomware viruses use sophisticated encryption algorithm how to make your files inaccessible. The goal of ransomware infections is to demand that you pay a ransom payment to get access to your files back.
How does Colecyrus@mail.com.b007 ransomware infect my computer?
Via several ways.Colecyrus@mail.com.b007 Ransomware infects computers by being sent via phishing e-mails, containing virus attachment.
This attachment is usually masked as an important document, like an invoice, bank document or even a plane ticket and it looks very convincing to users.
After you download and execute this attachment, a drive-by download occurs and your computer is infected with the ransomware virus.
Another way, you may become a victim of Colecyrus@mail.com.b007 is if you download a fake installer, crack or patch from a low reputation website or if you click on a virus link. Many users report getting a ransomware infection by downloading torrents.
How to open .Colecyrus@mail.com.b007 files?
You can't. At this point the .Colecyrus@mail.com.b007 files are encrypted. You can only open them once they are decrypted.
Decryptor did not decrypt my data. What now?
Do not panic and backup the files. If a decryptor did not decrypt your .Colecyrus@mail.com.b007 files successfully, then do not despair, because this virus is still new.
One way to restore files, encrypted by Colecyrus@mail.com.b007 ransomware is to use a decryptor for it. But since it's a new virus, advised that the decryption keys for it may not be out yet and available to the public. We will update this article and keep you posted as soon as this decryptor is released.
How Do I restore ".Colecyrus@mail.com.b007" files (Other Methods)?
Yes, sometimes files can be restored. We have suggested several file recovery methods that could work if you want to restore .Colecyrus@mail.com.b007 files.
These methods are in no way 100% guarantee that you will be able to get your files back. But if you have a backup, your chances of success are much greater.
How do I get rid of Colecyrus@mail.com.b007 ransomware virus?
The safest way and the most efficient one for the removal of this ransomware infection is the use a professional anti malware software. It will scan for and locate Colecyrus@mail.com.b007 ransomware and then remove it without causing any additional harm to your important .Colecyrus@mail.com.b007 files.
Also, keep in mind that viruses like Colecyrus@mail.com.b007 ransomware also install Trojans and keyloggers that can steal your passwords and accounts. Scanning your computer with an anti-malware software will make sure that all of these virus components are removed and your computer is protected in the future.
What to Do If nothing works?
There is still a lot you can do. If none of the above methods seem to work for you, then try these methods:
- Try to find a safe computer from where you can can login on your own line accounts like One Drive, iDrive, Google Drive and so on.
- Try to contact your friends, relatives and other people so that they can check if they have some of your important photos or documents just in case you sent them.
- Also, check if some of the files that were encrypted it can be re-downloaded from the web.
- Another clever way to get back some of your files is to find another old computer, a flash drive or even a CD or a DVD where you may have saved your older documents. You might be surprised what will turn up.
- You can also go to your email account to check if you can send any attachments to other people. Usually what is sent the email is saved on your account and you can re-download it. But most importantly, make sure that this is done from a safe computer and make sure to remove the virus first.
More tips you can find on our forums, where you can also asks any questions about your ransomware problem.
How to Report Ransomware to Authorities?
In case your computer got infected with a ransomware infection, you can report it to the local Police departments. It can help authorities worldwide track and determine the perpetrators behind the virus that has infected your computer. Below, we have prepared a list with government websites, where you can file a report in case you are a victim of a cybercrime:
Cyber-security authorities, responsible for handling ransomware attack reports in different regions all over the world:
- Germany - Offizielles Portal der deutschen Polizei
- United States - IC3 Internet Crime Complaint Centre
- United Kingdom - Action Fraud Police
- France - Ministère de l'Intérieur
- Italy - Polizia Di Stato
- Spain - Policía Nacional
- Netherlands - Politie
- Poland - Policja
- Portugal - Polícia Judiciária
- Greece - Cyber Crime Unit (Hellenic Police)
- India - Mumbai Police - CyberCrime Investigation Cell
- Australia - Australian High Tech Crime Center
Reports may be responded to in different timeframes, depending on your local authorities.