Contents
NEFILIM ransomware is a virus which originates from NEMTY ransomware family. It typically operates by encoding victim’s files on unsecured systems for the purpose of blackmailing – decryption of the files usually requires particular software which is possessed by the intruder. The encryption leaves all corrupted files with the .NEFILIM extension and by the time the action is completed, NEFILIM-DECRYPT.txt file appears on the user’s desktop.
The message which is found in the (NEFILIM-DECRYPT.txt) is quite straightforward – the victim has a choice – either to meet demands of the criminals or to take no action which, according to the criminals, will result in publicization of personal information within 7 days. The message (which is signed by jamesgonzaleswork1972@protonmail.com, pretty_hardjob2881@mail.com and dprworkjessiaeye1955@tutanota.com) also states that since the compromised files are encrypted using NEFILIM ransomware, it is not possible to regain access to original files using any third-party software.
The intruders promise to provide the key needed to regain access to the files once the demands are met, but this course of action is not recommended, since putting yourself at the criminal’s mercy might lead to pointless financial losses – victim cannot be sure that the tools needed for .nefilim file decryption will be given.
Name | NEFILIM ransomware |
Type | Ransomware; File-encrypting virus |
Ransom note | NEFILIM-DECRYPT.txt |
Encryption method | AES-128 + RSA-2048 |
Ransom demand | Typically asks for $1000-$1800 in Bitcoin |
Contact emails | jamesgonzaleswork1972@protonmail.com, pretty_hardjob2881@mail.com and dprworkjessiaeye1955@tutanota.com |
Extension | .nefilim file extension |
Decryption methods | No decryption tools available; restore files using data backup |
Distribution methods | Spreads via malicious spam, infected downloads, deceptive installers |
Removal | Remove using robust antivirus or anti-malware while in Safe Mode |
Unfortunately, it is true that in most of these kinds of cases the decryption without criminal’s intervention is impossible, unless the ransomware is still in development stages and has flaws which could be exploited in victim’s favor. NEFILIM virus uses AES 128 and RSA 2048 ciphers for data encryption and dynamically calls SystemFunction036 to generate new key per victim’s file.
Nevertheless, the only rational action you can take in this situation is to remove NEFILIM ransomware virus completely from your computer. Sadly, this action won’t help to restore your compromised files. However, you can always recover them from a backup. The only condition is that it needs to be created before the intrusion and held in a different location.
Generally, all types of malware (including ransomware) can infect your computer in various ways – via trojans, illegitimate activation software (a.k.a. cracks), fabricated updaters, spam campaigns, unreliable download sources etc. Spam campaigns send deceitful emails, which might have infectious files or links attached to them.
Fake updaters can harm your system by exploiting outdated products and might install ransomware instead of the updates. Trojans are infamous for having many abhorrent capabilities, such as triggering additional malware installation. In fact, damaging files come in various formats, from Microsoft Office and PDF documents to executable files. Therefore, there is no single and effective method on how to identify these kinds of threats.
The easiest and most efficient way to infect victim’s computer is by exploiting people who use free file-hosting sites, various file sharing networks (Torrents, eMule, etc.) and in general – tend to download from the Internet inattentively. All of the before mentioned methods might be used to spread viruses, including NEFILIM ransomware.
In order to keep your system safe from reoccurring intrusions and file encryptions, you need to remove the NEFILIM ransomware immediately. Certain preparation for the elimination is required beforehand, so follow closely. Follow the steps given below to boot your PC in Safe Mode, then proceed with the next steps to completely terminate the virus from your system.
It is important, that the NEFILIM Ransomware removal should be done using trustworthy antivirus or anti-malware software, to ensure that, we recommend reading our reviews on them. As soon as the removal is complete, do not forget to change passwords for all websites and accounts saved in your browsers imminently.
OUR GEEKS RECOMMEND
Our team recommends a two-step rescue plan to remove ransomware and other remaining malware from your computer, plus repair caused virus damage to the system:
GeeksAdvice.com editors select recommended products based on their effectiveness. We may earn a commission from affiliate links, at no additional cost to you. Learn more.
NEFILIM Ransomware Removal Guidelines
Before you try to remove the virus, you must start your computer in Safe Mode with Networking. Below, we provide the easiest ways to boot PC in the said mode, but you can find additional ones in this in-depth tutorial on our website – How to Start Windows in Safe Mode. Also, see a video tutorial on how to do it:
Instructions for Windows XP/Vista/7 users
Instructions for Windows 8/8.1/10 users
Now, you can search for and remove NEFILIM Ransomware files. It is very hard to identify files and registry keys that belong to the ransomware virus, Besides, malware creators tend to rename and change them repeatedly. Therefore, the easiest way to uninstall such type of a computer virus is to use a reliable malware removal program. In addition, we suggest trying a combination of INTEGO antivirus (removes malware and protects your PC in real-time) and RESTORO (repairs virus damage to Windows OS files).
REMOVE MALWARE & REPAIR VIRUS DAMAGE
1 Step. Get robust antivirus to remove existing threats and enable real-time protection
INTEGO Antivirus for Windows provides robust real-time protection, Web Shield against phishing and deceptive websites, blocks malicious downloads and blocks Zero-Day threats. Use it to remove ransomware and other viruses from your computer professionally.
2 Step. Repair Virus Damage on Windows Operating System Files
Download RESTORO to scan your system for FREE and detect security, hardware and stability issues. You can use the scan results and try to remove threats manually, or you can choose to get the full version of software to fix detected issues and repair virus damage to Windows OS system files automatically.
In order to use System Restore, you must have a system restore point, created either manually or automatically.
Instructions for Windows XP/Vista/7 users
Instructions for Windows 8/8.1/10 users
After restoring the system, we recommend scanning the system with antivirus or anti-malware software. In most cases, there won't be any malware remains, but it never hurts to double-check. In addition, we highly recommend checking ransomware prevention guidelines provided by our experts in order to protect your PC against similar viruses in the future.
Malwarebytes Anti-Malware
Removing spyware and malware is one step towards cybersecurity. To protect yourself against ever-evolving threats, we strongly recommend purchasing a Premium version of Malwarebytes Anti-Malware, which provides security based on artificial intelligence and machine learning. Includes ransomware protection. See pricing options and protect yourself now.
System Mechanic Ultimate Defense
If you're looking for an all-in-one system maintenance suite that has 7 core components providing powerful real-time protection, on-demand malware removal, system optimization, data recovery, password manager, online privacy protection and secure driver wiping technology. Therefore, due to its wide-range of capabilities, System Mechanic Ultimate Defense deserves Geek's Advice approval. Get it now for 50% off. You may also be interested in its full review.
Disclaimer. This site includes affiliate links. We may earn a small commission by recommending certain products, at no additional cost for you. We only choose quality software and services to recommend.
Matt Corey is passionate about the latest tech news, gadgets and everything IT. Matt loves to criticize Windows and help people solve problems related to this operating system. When he’s not tinkering around with new gadgets he orders, he enjoys skydiving, as it is his favorite way to clear his mind and relax.
VLFF ransomware is a virtual menace to your computer files VLFF ransomware is a newly…
UIGD ransomware encrypts all files on a computer, asks for a ransom UIGD ransomware is…
EYRV ransomware takes your computer files hostage, demands a ransom EYRV ransomware is a destructive…
Private Internet Access (PIA) VPN maintains its long-term role as a leader Private Internet Access…
XCBG ransomware aims to lock your files and demand a ransom XCBG ransomware is a…
BPQD ransomware encrypts all computer files, demands a ransom from the user BPQD ransomware is…
This website uses cookies.
View Comments
Thanks so much - removed the malware, need to restore files somehow! Did anyone have any success??