Update September 2019. What is NEMTY ransomware ransomware? How does NEMTY ransomware work? How to open NEMTY ransomware files? How to remove NEMTY ransomware and try to restore files, encrypted by it?
The NEMTY ransomware is actually a ransomware infection, whose main idea is to make sure that you won’t be able to use your files anymore, until you pay ransom to the cyber-criminals who are behind it. The main idea of this is that your files get blocks of their data replaced with data from the AES encryption algorithm used by the NEMTY ransomware. The virus then adds its own file extension and drops a ransom note file. This file’s main purpose is to get victims to pay ransom to get your files to be decrypted using the unique decryption key that is generated and held by the crooks. Read this article to learn how to remove NEMTY ransomware from your computer and learn how to recover data encoded by it.
|Short Description||Aims to encrypt files and then ad its custom file extension to them.|
|Symptoms||Files are encrypted and cannot be opened. The NEMTY ransomware also drops a ransom note file, containing the extortionist message.|
|Distribution Method||Spam Emails, Email Attachments, Executable files|
|Detection Tool|| See If Your System Has Been Affected by NEMTY ransomware |
Malware Removal Tool
|User Experience||Join Our Forum to Discuss NEMTY ransomware.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
NEMTY ransomware Ransomware – Update September 2019 — Radio Exploit Kit Infections
A large-scale attack carrying the NEMTY ransomware ransomware is being done by a popular exploit kit known as RadioEK. The exact mechanism which has been discovered by the security experts shows that the infiltrations are done via phishing email messages that are sent in bulk to the intended recipients. In them a malicious file is placed which is actually a double extension — the image appears to the users as JPG but is in fact an EXE file. When the victims open it they will actually start the infection engine. This means that there are two possible options of persuading them in the case of email messages:
- Multimedia Embedded File — The dangerous JPG file may be placed inside the rich content that contains the design layout. This means that there is a possibility that it is immediately started as soon as the users click on the phishing email message.
- File Attachment or Malware Link — The criminals can also send out the associated file through file attachments or links that are sent to the victims. When they are opened the JPG file will be downloaded onto their local machine. When they run it the infection will start.
As a result the associated infection sequence will be launched. The virus will begin with an application bypass by extracting the list of running applications and stopping any processes that are of common user applications. This is done in order to temporarily prevent the users from performing ordinary actions.
This is also related to the bypass of security applications and services — using the same mechanism the criminals can stop running anti-virus engines, virtual machine host, firewalls, intrusion detection systems and etc.
The NEMTY ransomware ransomware will start a local client that will establish and maintain a secure connection to a hacker-controlled server. This will allow the criminals to take over control of the hosts, steal user data and spy on the activities of the users. The next step is to delete system data making recovery very difficult: backups, restore points and shadow volume copies. After all of these steps have finished the actual file encryption will be carried out in the usual fashion.
NEMTY ransomware Ransomware – Update September 2019 — Second Wave of Attacks
The NEMTY Ransomware is a very dangerous virus which has seen multiple iterations over the last few weeks. The different hacking groups behind the campaigns have created several iterations of the threat making it one of the most popular. The short development time between them has allowed criminals to add in new mechanisms through which the hackers can reach their prospective targets.
What’s particularly dangerous about these viruses is that they are exercising a wide variety of techniques used to deliver the infection. One of the recent examples is the creation of numerous phishing PayPal pages that are constructed in order to make the visitors think that they are accessing a legitimate landing page or payment window.
The bulk of the infections are caused by the use of the RIG exploit kit which carries the ransomware as the main payload. Combined with the PayPal phishing this has led to the creation of a complex and very functional attack strategy. The pages which are showed to the victims will promise cashback rewards and other lucrative proposals in order to make the visitors enter in their credentials, personal information, bank card details or scam them into downloading the NEMTY ransomware. The newer version of the threat which is delivered onto the compromised hosts uses a faster engine in order to carry out the file encryption.
One of the new distinct features of a newer release of it is that it includes a country check which is done by the built-in isRU function which will check if the infected computer is located in any of the following countries: Belarus, Russia, Kazakhstan, Ukraine or Tajikistan. If the result is positive then the virus will not proceed with the file encryption.
At the moment the majority of software which is targeted by the exploit kit are ones that are known to be frequently exploited by weaknesses: Internet Explorer and Adobe Flash Player.
NEMTY ransomware Ransomware – Update September 2019
A security researcher known as Mol69 reported that Nemty ransomware is being distributed with the help of RIG exploit kit. The researchers came across a malicious payload in malvertising campaigns associated with RIG.
The ransomware again used the .nemty file extension. However, the variant caught by Mol69 appended the ._NEMTY_Lct5F3C_ extension to encrypted files.
NEMTY ransomware Ransomware – How Did I Get It and What Does It Do?
The primary method of distribution that is used by the NEMTY ransomware is believed to be either via malicious web links or infection files. If by infection files. The NEMTY ransomware may enter your computer as an e-mail attachment in an e-mail sent via various different types of convincing mail subjects. Such can pretend that you have received an invoice, receipt or a document from your bank.
Not only this, but you may also download various different types of files and objects that you believe are legitimate. They can however prove to be exactly the opposite as these files may turn out to be the virus infection file.
Once you have become infected with the NEMTY ransomware, you may immediately notice it as your files may start to appear with the .nemty extension.
The first thing that happens after an infection with the NEMTY ransomware is that the virus files are dropped in the following directories:
When this happens, the NEMTY ransomware ransomware will then begin to perform the following malicious actions on your computer:
- Create mutexes.
- Touch system files.
- Modify the Run and RunOnce Windows registries.
- Obtain system information from your computer.
- Relay information.
- Obtain rights as an administrator to read and write files.
Similar to other viruses just like it, the NEMTY ransomware, leaves a ransom note file named NEMTY-DECRYPT.txt that reads the following:
—=== NEMTY PROJECT ===—[+] Whats Happen? [+]
Your files are encrypted, and currently unavailable. You can check it: all files on you computer has extension .nemty[+] What guarantees? [+]
By the way, everything is possible to restore, but you need to follow our instructions. Otherwise, you cant return your data (NEVER).
It’s just a business. We absolutely do not care about you and your deals, except getting benefits.[+] How to get access on website? [+]
If we do not do our work and liabilities – nobody will not cooperate with us.
It’s not in our interests.
If you will not cooperate with our service – for us, its does not matter. But you will lose your time and data, cause just we have the private key.
In practise – time is much more valuable than money.
1) Download and install TOR browser from this site: hxxps://torproject.org/
2) Open our website: – zjoxyw5mkacojk5ptn2iprkivg5clow72mjkyk5t***zxprjjnwapkad.onion
When you open our website, follow the instructions and you will get your files back.
Configuration file path: –
After it has becomes a reality, the NEMTY ransomware begins scanning your computer for different files to encyrpt. NEMTY ransomware carefully skips encrypting files in the default system directories of Windows and instead it begins to encrypt files that have the following file extensions:
Here is a screenshot of NEMTY PROJECT’s website’s homepage as well:
“PNG .PSD .PSPIMAGE .TGA .THM .TIF .TIFF .YUV .AI .EPS .PS .SVG .INDD .PCT .PDF .XLR .XLS .XLSX .ACCDB .DB .DBF .MDB .PDB .SQL .APK .APP .BAT .CGI .COM .EXE .GADGET .JAR .PIF .WSF .DEM .GAM .NES .ROM .SAV CAD Files .DWG .DXF GIS Files .GPX .KML .KMZ .ASP .ASPX .CER .CFM .CSR .CSS .HTM .HTML .JS .JSP .PHP .RSS .XHTML. DOC .DOCX .LOG .MSG .ODT .PAGES .RTF .TEX .TXT .WPD .WPS .CSV .DAT .GED .KEY .KEYCHAIN .PPS .PPT .PPTX ..INI .PRF Encoded Files .HQX .MIM .UUE .7Z .CBR .DEB .GZ .PKG .RAR .RPM .SITX .TAR.GZ .ZIP .ZIPX .BIN .CUE .DMG .ISO .MDF .TOAST .VCD SDF .TAR .TAX2014 .TAX2015 .VCF .XML Audio Files .AIF .IFF .M3U .M4A .MID .MP3 .MPA .WAV .WMA Video Files .3G2 .3GP .ASF .AVI .FLV .M4V .MOV .MP4 .MPG .RM .SRT .SWF .VOB .WMV 3D .3DM .3DS .MAX .OBJ R.BMP .DDS .GIF .JPG ..CRX .PLUGIN .FNT .FON .OTF .TTF .CAB .CPL .CUR .DESKTHEMEPACK .DLL .DMP .DRV .ICNS .ICO .LNK .SYS .CFG”
After the files are encrypted, you cannot open them and a unique file decryption key is generated and transferred to the cyber-criminals. This makes them the only ones who can unlock your files immediately. Despite this being the fact, we strongly advise you not to pay any ransom for that matter, because paying means that you lay your trust in the same people who encrypted your files and this is not a good idea.
Remove NEMTY Virus and Try Restoring Files
To remove NEMTY ransomware from your computer, we strongly recommend that you read the instructions underneath. They have been created with the primary purpose to help you remove the NEMTY ransomware files and try to restore all encrypted data. For a faster and effective removal, we strongly recommend that you download and run a scan of your computer using a professional malware removal software. Such program has been made with the main idea to help you erase all traces of the NEMTY ransomware from your machine by scanning for its files and objects. It can also protect you from future threats and intrusive software of this type.