Napoleon is the name of a newly discovered ransomware threat that attacks online users in order to encrypt valuable files. Once Napoleon corrupts all target files it appends an extension of the same name .napoleon to their names. A vivid trait of the infection is also a ransom that appears on the PC screen. It is contained in a file with name How_Decrypt_Files.hta which is dropped on the system. The ransom note does not reveal what ransom amount is demanded for the decryption of .napoleon files.
This article aims to help those of you who are trying to remove Napoleon ransomware from the infected device. In it are also presented alternative recovery methods for .napoleon files.
Threat Summary
Name | Napoleon |
Type | Ransomware, Cryptovirus |
Short Description | The ransomware virus encrypts files on your PC and a ransom note will be left demanding that you pay an unspecified amount of money in Bitcoins, after contacting the extortionists. |
Symptoms | This ransomware will encrypt your files and then append the extension .napoleon on every encrypted file. |
Distribution Method | Spam Emails, Email Attachments, Executable Files |
Detection Tool |
See If Your System Has Been Affected by malware
Download
Malware Removal Tool
|
User Experience | Join Our Forum to Discuss Napoleon. |
Data Recovery Tool | Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive. |
Napoleon Ransomware – Distribution
The ransomware infection may be spread via various techniques with spam email campaigns being the most preferred one. Such emails are usually with spoofed email address and sender. To make the emails look more trustworthy hackers may pose as representatives from popular websites, organizations and even governmental entities. The main aim is to trick you into downloading a malicious file attachment that may be a document, an archive, a picture, a project, or other file types so you can open it on the PC. Once you do this, the Napoleon ransomware payload executes on the system and triggers the infection process. Another way of Napoleon ransomware distribution may be links that land on corrupted web pages. The ransomware payload is usually set to penetrate the system unnoticeably and launches its payload.
Fake notifications for software updates may also be used for Napoleon ransomware distribution. They could pop up during online browsing session disguising as reminders of widely used programs.
Napoleon Ransomware – Infection Flow
The infection is triggered by a Trojan that is associated with another ransomware called Blind. The Blind crypto virus was first detected by our team in September this year. Now it seems that the code of the threat is modified and released in a new active attack campaign against online users.
The analyses of the new Napoleon ransomware samples reveal that it has a rather complex code so it can perform various malicious actions. Once the Trojan penetrates the system, it can delete files and stop various processes. Both actions are believed to be performed in order that Napoleon could easily bypass the available security layers and establish its malicious files on the system. Then the threat can create additional files and terminate processes that enable the attack. The folders where Napoleon may locate some of its files are:
- %AppData%
- %Temp%
- %Roaming%
- %Common%
- %System32%
To achieve persistence, the Napoleon ransomware could access the Windows Registry editor where it can enter new entries. Usually, crypto viruses like Napoleon make changes to keys that can execute the malicious files established on the host. As a result, the ransomware can start each time the Windows Operating System is launched. One of the main target keys is the Run registry key:
→HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
At the end of the attack Napoleon ransomware drops a file named How_Decrypt_Files.hta that contains a message by crooks. In it, they state that the only way to decrypt .napoleon files is by using the special Napoleon decrypter. Even though that there is no information whether they demand a ransom or not it is most likely that they will try to blackmail you to transfer them Bitcoins. Below you can see what the ransom message reads and how it does look like:
Attention!
Your documents, photos, databases and other important files have been encrypted cryptographically strong, without the original key recovery is impossible! To decrypt your files you need to buy the special software – NAPOLEON DECRYPTED Using another tools could corrupt your files, in case of using third party software we don’t give guarantees that full recovery is possible so use it on your own risk.
If you want to restore files, write us to the e-mail: supp01@airmail.cc In subject line write encryption and attach your ID in body of your message also attach to email 3 crypted files. (files have to less than 2MB)
It is in your interest to respond as soon as possible to ensure the restoration of your files, because we wont keep your decryption keys at our server more than one week in interest of our security.
Only in case you do not receive a response from the first email address within 48 hours, please use this alternative email address: supportdecrypt2@cock.li
Your personal identification number:
Under no circumstances, you should contact and negotiate with the hackers. First, they can access your system and make it an easy gateway for additional malware infections. Second, by acting on their rules and paying the ransom, you can only encourage them to continue spreading devastating infections like Napoleon. In this article, you can find a secure solution to the problem so you will be able to regain the control over your PC and files without funding crooks.
Napoleon Ransomware – Data Encryption
If the Napoleon crypto virus really has something in common with the Blind ransomware or somehow uses its code, it is likely to target the same file types. The following list reveals all data that may be affected after the attack occurs:
→.1c, .3fr, .accdb, .ai, .arw, .bac, .bay, .bmp, .cdr, .cer, .cfg, .config, .cr2, .crt, .crw, .css, .csv, .db, .dbf, .dcr, .der, .dng, .doc, .docm, .docx, .dwg, .dxf, .dxg, .eps, .erf, .gif, .htm, .html, .indd, .iso, .jpe, .jpeg, .jpg, .kdc, .lnk, .mdb, .mdf, .mef, .mk, .mp3, .mp4, .mrw, .nef, .nrw, .odb, .ode, .odm, .odp, .ods, .odt, .orf, .p12, .p7b, .p7c, .pdd, .pdf, .pef, .pem, .pfx, .php, .png, .ppt, .pptm, .pptx, .psd, .pst, .ptx, .r3d, .rar, .raw, .rtf, .rw2, .rwl, .sql, .sr2, .srf, .srw, .tif, .wb2, .wma, .wpd, .wps, .x3f, .xlk, .xls, .xlsb, .xlsm, .xlsx, .zip
For the encryption process, the ransomware is likely to utilize strong cipher algorithm that modifies the original code of predefined files. All the encrypted files can be recognized by the specific extensions appended at the end of their filenames. The Napoleon follows the pattern .[ supp01@airmail.cc].napoleon where the first extension is the cybercriminals’ support email. Corrupted files remain unusable until a proper solution is applied for their recovery.
To eliminate one of the data recovery options, Napoleon could delete the Shadow Volume Copies created and stored by the Windows Operating System.
Remove Napoleon Ransomware – Restore .napoleon Files
Napoleon ransomware is a devastating infection that should be removed as soon as it is detected on the PC. Only after its complete removal from the system, you can use the device normally again. Otherwise, the ransomware will start its malicious files each time you start the PC, encrypt all your new files which are part of its target list and interrupt the regular system performance. The step-by-step Napoleon ransomware removal guide below will help you to get rid of the threat once and forever. Security researchers recommend the help of advanced anti-malware tool for maximum efficiency.
After the removal of the ransomware be advised to back up all encrypted files to an external drive and then proceed with the file restore process which can also be found in the instructions below.
- Guide 1: How to Remove Napoleon from Windows.
- Guide 2: Get rid of Napoleon from Mac OS X.
- Guide 3: Remove Napoleon from Google Chrome.
- Guide 4: Erase Napoleon from Mozilla Firefox.
- Guide 5: Uninstall Napoleon from Microsoft Edge.
- Guide 6: Remove Napoleon from Safari.
- Guide 7: Eliminate Napoleon from Internet Explorer.
Windows Mac OS X Google Chrome Mozilla Firefox Microsoft Edge Safari Internet Explorer
How to Remove Napoleon from Windows.
Step 1: Boot Your PC In Safe Mode to isolate and remove Napoleon





Step 2: Uninstall Napoleon and related software from Windows
Here is a method in few easy steps that should be able to uninstall most programs. No matter if you are using Windows 10, 8, 7, Vista or XP, those steps will get the job done. Dragging the program or its folder to the recycle bin can be a very bad decision. If you do that, bits and pieces of the program are left behind, and that can lead to unstable work of your PC, errors with the file type associations and other unpleasant activities. The proper way to get a program off your computer is to Uninstall it. To do that:



Step 3: Clean any registries, created by Napoleon on your computer.
The usually targeted registries of Windows machines are the following:
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
You can access them by opening the Windows registry editor and deleting any values, created by Napoleon there. This can happen by following the steps underneath:



Before starting "Step 4", please boot back into Normal mode, in case you are currently in Safe Mode.
This will enable you to install and use SpyHunter 5 successfully.
Windows Mac OS X Google Chrome Mozilla Firefox Microsoft Edge Safari Internet Explorer
Get rid of Napoleon from Mac OS X.
Step 1: Uninstall Napoleon and remove related files and objects
1. Hit the ⇧+⌘+U keys to open Utilities. Another way is to click on “Go” and then click “Utilities”, like the image below shows:
- Go to Finder.
- In the search bar type the name of the app that you want to remove.
- Above the search bar change the two drop down menus to “System Files” and “Are Included” so that you can see all of the files associated with the application you want to remove. Bear in mind that some of the files may not be related to the app so be very careful which files you delete.
- If all of the files are related, hold the ⌘+A buttons to select them and then drive them to “Trash”.
In case you cannot remove Napoleon via Step 1 above:
In case you cannot find the virus files and objects in your Applications or other places we have shown above, you can manually look for them in the Libraries of your Mac. But before doing this, please read the disclaimer below:
You can repeat the same procedure with the following other Library directories:
→ ~/Library/LaunchAgents
/Library/LaunchDaemons
Tip: ~ is there on purpose, because it leads to more LaunchAgents.
Step 2: Scan for and remove Napoleon files from your Mac
When you are facing problems on your Mac as a result of unwanted scripts and programs such as Napoleon, the recommended way of eliminating the threat is by using an anti-malware program. SpyHunter for Mac offers advanced security features along with other modules that will improve your Mac’s security and protect it in the future.
Windows Mac OS X Google Chrome Mozilla Firefox Microsoft Edge Safari Internet Explorer
Remove Napoleon from Google Chrome.
Step 1: Start Google Chrome and open the drop menu
Step 2: Move the cursor over "Tools" and then from the extended menu choose "Extensions"
Step 3: From the opened "Extensions" menu locate the unwanted extension and click on its "Remove" button.
Step 4: After the extension is removed, restart Google Chrome by closing it from the red "X" button at the top right corner and start it again.
Windows Mac OS X Google Chrome Mozilla Firefox Microsoft Edge Safari Internet Explorer
Erase Napoleon from Mozilla Firefox.
Step 1: Start Mozilla Firefox. Open the menu window
Step 2: Select the "Add-ons" icon from the menu.
Step 3: Select the unwanted extension and click "Remove"
Step 4: After the extension is removed, restart Mozilla Firefox by closing it from the red "X" button at the top right corner and start it again.
Windows Mac OS X Google Chrome Mozilla Firefox Microsoft Edge Safari Internet Explorer
Uninstall Napoleon from Microsoft Edge.
Step 1: Start Edge browser.
Step 2: Open the drop menu by clicking on the icon at the top right corner.
Step 3: From the drop menu select "Extensions".
Step 4: Choose the suspected malicious extension you want to remove and then click on the gear icon.
Step 5: Remove the malicious extension by scrolling down and then clicking on Uninstall.
Windows Mac OS X Google Chrome Mozilla Firefox Microsoft Edge Safari Internet Explorer
Remove Napoleon from Safari.
Step 1: Start the Safari app.
Step 2: After hovering your mouse cursor to the top of the screen, click on the Safari text to open its drop down menu.
Step 3: From the menu, click on "Preferences".
Step 4: After that, select the 'Extensions' Tab.
Step 5: Click once on the extension you want to remove.
Step 6: Click 'Uninstall'.
A pop-up window will appear asking for confirmation to uninstall the extension. Select 'Uninstall' again, and the Napoleon will be removed.
Windows Mac OS X Google Chrome Mozilla Firefox Microsoft Edge Safari Internet Explorer
Eliminate Napoleon from Internet Explorer.
Step 1: Start Internet Explorer.
Step 2: Click on the gear icon labeled 'Tools' to open the drop menu and select 'Manage Add-ons'
Step 3: In the 'Manage Add-ons' window.
Step 4: Select the extension you want to remove and then click 'Disable'. A pop-up window will appear to inform you that you are about to disable the selected extension, and some more add-ons might be disabled as well. Leave all the boxes checked, and click 'Disable'.
Step 5: After the unwanted extension has been removed, restart Internet Explorer by closing it from the red 'X' button located at the top right corner and start it again.