Cooper Ransomware Author Uses Simple Email for Contact

email scam malware

The ransomware known as Cooper has been created with the intention of encrypting files and blocking access to them. Once encryption is complete, Cooper appends the ".Cooper" extension to all the encrypted files' filenames and creates a ransom note in the form of a text file called "Cooper_Recover.txt". A renaming example for Cooper is changing "1.jpg" to "1.jpg.Cooper" and "2.png" to "2.png.Cooper".

According to the ransom note, the decryption software necessary to recover the encrypted data is exclusively in the attackers' possession. The note assures victims that once the software is installed and run on the system, everything will return to normal. It urges the victims to make immediate contact through two email addresses provided: cooper@onionmail.org or cooper@cyberfear.com, and to buy the decryption software. The attackers instruct the victims to include their ID in the email subject line, as they won't respond otherwise.

Cooper Ransom Note Keeps it Brief

The ransom note generated by the ransomware contains a brief message from the hackers that reads as follows:

Your ID: -

We are the only ones that own the decryption software. After you run it on your system, all of your data will be recovered and everything will be back to normal as if nothing had happened.

As a result, we advise you to contact us at the following Email addresses and buy the decryption software RIGHT NOW:

Cooper@onionmail.org
Cooper@cyberfear.com

** You Must Include Your ID in the Subject line of Your Email, Otherwise We WILL NOT ANSWER….

How Can You Keep Your System Safe from Ransomware Like Cooper?

There are several steps you can take to keep your system safe from ransomware such as Cooper:

  • Regularly backup your files: This is essential to ensure you have a copy of all your important files in case they are encrypted by ransomware. It is important to store the backup files in a separate location that is not connected to your computer, such as an external hard drive or cloud storage.
  • Install and update antivirus software: A good antivirus program can detect and prevent ransomware infections. Make sure to keep your antivirus software updated to ensure it can protect against the latest threats.
  • Be cautious with email attachments and links: Most ransomware infections occur through email attachments and links. Avoid clicking on links or downloading attachments from unknown or suspicious sources.
  • Keep your software up-to-date: Regularly updating your operating system, software, and applications can help prevent ransomware infections by patching vulnerabilities that can be exploited by cybercriminals.
  • Use strong passwords: Ransomware attackers often use brute force attacks to gain access to systems. Use strong, unique passwords and consider using a password manager to keep track of them.
  • Use a firewall: A firewall can help prevent unauthorized access to your system by blocking malicious traffic and connections.

By following these steps, you can reduce the risk of ransomware infections and keep your system safe from attacks like Cooper.

April 13, 2023
Loading...

Cyclonis Backup Details & Terms

The Free Basic Cyclonis Backup plan gives you 2 GB of cloud storage space with full functionality! No credit card required. Need more storage space? Purchase a larger Cyclonis Backup plan today! To learn more about our policies and pricing, see Terms of Service, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.

Cyclonis Password Manager Details & Terms

FREE Trial: 30-Day One-Time Offer! No credit card required for Free Trial. Full functionality for the length of the Free Trial. (Full functionality after Free Trial requires subscription purchase.) To learn more about our policies and pricing, see EULA, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.