Remove Boss Ransomware
The Makop Ransomware is one of the threats that has given dozens of cybercriminals a chance to craft their own ransomware project in a matter of hours. One of the latest threats based on the Makop Ransomware file-locker is the Boss Ransomware, and, unfortunately, users attacked by it may not have a reliable way to recover their data. The only way to do it is to restore the affected files from a backup, but, unfortunately, this might not always be an option.
Boss Ransomware's attack is very quick, and victims will not have a chance to prevent it unless they have a reliable antivirus tool to keep them safe. Once launched, the Boss Ransomware proceeds to encrypt files using certain extensions and then adds a new suffix to their name – '[<VICTIM ID>].[pay_btc2021@protonmail.com].Boss.' The list of file types that the Boss Ransomware locks is very extensive. Its primary targets are files that may contain valuable information – images, documents, videos, media, etc.
The ransom note is called 'readme-warning.txt' and it is available on the desktop usually. According to it, free decryption is not an option – the criminals are the only ones able to undo the damage. They also promise to provide a sample of their decryption service – victims just need to send them two small files to pay_btc2021@protonmail.com or paybtc2021@msgsafe.io.
While the free decryption option is something to take advantage of, you should not consider sending money to Boss Ransomware's creators. Even if they get their payment, they may decide not to help you. For example, ransomware operators often continue to extort their victims for money once they get the first payment. If the Boss Ransomware has damaged your data, you need to run an antivirus scanner to eliminate the threat. After this, recover from a backup or try out 3rd-party data restoration tools and techniques.