.omerta Files Virus – How to Remove It and Restore Your Files

.omerta Files Virus – How to Remove It and Restore Your Files

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)

This article has been created to help you by explaining how to remove the .omerta file extension ransomware and how to restore renamed and encrypted files by it.

A new virus, believed to be yet another evolutin of the Scarab ransomware has been detected by security researchers. The malware reportedly uses the .omerta file extension and renames the files upon encryption. It then adds a ransom note, called “READ THIS IF YOU WANT TO GET ALL YOUR FILES BACK.TXT”. In the note, the crooks basically extort the victims to pay a hefty ransom fee in order to get their files recovered back to their normal working state. In the events that your computer has been infected by the .omerta files ransomware, we advise that you read this article and learn how you can remove this ransomware and how to restore files that are encrypted by it without having to pay ransom.

Threat Summary

Name.omerta Files Virus
TypeRansomware, Cryptovirus
Short DescriptionAims to encrypt the files on the infected computer and then ask the victim to pay ransom to get them to work again.
SymptomsThe files on the infected PC are encrypted with an added .omerta file extension. A ransom note, called READ THIS IF YOU WANT TO GET ALL YOUR FILES BACK.TXT is dropped.
Distribution MethodSpam Emails, Email Attachments, Executable files
Detection Tool See If Your System Has Been Affected by .omerta Files Virus


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss .omerta Files Virus.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

.omerta Files Virus — October 2019 Update

The .omerta Files Virus has received a new update as new samples carrying it have been detected. It is probably being sent by a new hacking collective which has edited out the former samples and has created a new release. While the samples are not large in size it is anticipated that this means that there is a renewed interest in this malware family by both inexperienced and experienced criminal collective. Like the previous samples it will assign the .omerta extension and include the contact email address in the extension string. The hackers behind this new release use the patern32@protonmail.com email contact address.

.omerta Files Virus – Infection Methods

The main method which is used by the .omerta files ransomware is to infect user computers with the aid of obfuscated malicious files. These types of files may be encountered within different spam e-mails, which often pretend to be legitimate however are not. The e-mails that may contain the malicious file attachments may pretend to be invoices, receipts and other types of seemingly legitimate files. The e-mails accompanying them are very cunning and aim to deceive the victim to open the attachment by stressing out how important it is.

In addition to via e-mails, the ransomware virus may also come as various different types of files which may only pretend that they are legitimate but in reality however, the malicious files are obfuscated and slither while unnoticed on the victim’s computer. The most often imitated types of files are believed to be:

  • Setups.
  • Cracks.
  • Patches.
  • License Activators.
  • Key generators or keygens.

.omerta Files Virus – More Information

Once the .omerta files virus has infected your computer, the malware may start to drop it’s malicious payload on the computers of victims. The payload may reside in the following folders:

  • %AppData%
  • %Local%
  • %LocalLow%
  • %Roaming%.
  • %Temp%

Among the files dropped by the .omerta virus is also it’s ransom note, called READ THIS IF YOU WANT TO GET YOUR FILES BACK.TXT and according to malware researcher demonslay335 it has the following contents:

| |

Your files are now encrypted!



All your files have been encrypted due to a security problem with your PC.

Now you should send us email with your personal identifier.
This email will be as confirmation you are ready to pay for decryption key.
You have to pay for decryption in BITCOINS. The price depends on how fast you write to us.
After payment we will send you the decryption tool that will decrypt all your files.

Contact us using this email address: XAVAX@PM.ME

Free decryption as guarantee!
Before paying you can send us up to 3 files for free decryption.
The total size of files must be less than 10Mb (non archived), and files should not contain
valuable information (databases, backups, large excel sheets, etc.).
| |
| Attention! |
| |
| * Do not rename encrypted files. |
| * Do not try to decrypt your data using third party software, it may cause permanent data loss. |
| * Decryption of your files with the help of third parties may cause increased price |
| (they add their fee to our) or you can become a victim of a scam. |
| |

The virus’s infection activity may consist of different types of actions which include the creating of mutants and the tampering with system processes of Windows. In addition to this, the ransomware virus may also create registry entries in the Run and RunOnce Windows Registry sub-keys, with the following locations:

→ HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

Furthermore, the .omerta files virus may also start to delete the shadow volume copies of the infected machine, which results in the user not able to recover his or her files by using Windows Recovery. The deletion may happen by running a batch script whose main goal is to run the following commands as an administrator:

→ sc stop VVS
sc stop wscsvc
sc stop WinDefend
sc stop wuauserv
sc stop BITS
sc stop ERSvc
sc stop WerSvc
cmd.exe /C bcdedit /set {default} recoveryenabled No
cmd.exe /C bcdedit /set {default} bootstatuspolicy ignoreallfailures
C:\Windows\System32\cmd.exe” /C vssadmin.exe Delete Shadows /All /Quiet

.omerta – Encryption Procedure

The encryption process of this believed-to-be evolved variant of Scarab ransomware is devastating. The ransomware uses an advanced encryption mode to encrypt the following types of files:

  • Databases.
  • Backups.
  • Microsoft Office and other types of documents.
  • Images.
  • Videos.
  • Archives.
  • Other valuable files.

After the encryption process, the .omerta files virus uses an obnoxious file name which is randomly generated to additionally scramble the encrypted files and for a file extension, the malware ads the e-mail of it’s authors XAVAX@PM.ME plus the file suffix .omerta. The files look disgustingly random after the encryption and can no longer be opened:

This is because the ransomware may use a combination of RSA+AES encryption algorithm which changes the core structure of the files in question, generating what appears to be a decryption key which is known only by the cyber-criminals.

Remove .omerta Files Virus and Restore Encrypted Files

In order to remove this ransomware infection from your computer, we strongly suggest that you follow the removal instructions underneath this article. They have been created in order to best help you remove this ransomware virus from your computer by explaining to your how to delete it either manually or automatically. For maximum effectiveness, be advised that security experts do advise to download and install and advanced anti-malware software. Such tool will effectively scan your computer for malware and remove it plus make sure to protect your PC automatically against different types of malicious software and intrusive programs.

If you want to restore files that have been encrypted by this ransomware infection on your computer, we would suggest to try the alternative methods and tools for file recovery we have suggested in step “2. Restore files, encrypted by .omerta Files Virus” below. They may not be 100% guarantee to be able to recover all of your encrypted files, but they may help you to restore most of them, if you are in luck.


Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Follow Me:

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share