How to delete Hermes

May 28, 2019

What is Hermes

Hermes ransomware is a file locking threat that was first spotted in the wild in February 2017 and is highly associated with cyber criminal group Lazarus. Since its initial release, Hermes 2.0 and Hermes 2.1 variants surfaced, although all versions avoid infecting Russian, Ukrainian and Belarusian netizens.

The initial Hermes ransomware does not append an extension to the file, although it does alter its structure of the file code by attaching Hermes at the end of the string (nevertheless, later variants do mark data with .HRM extension). This process is done with the help of AES-256 and RSA-2048 ciphers.

How to delete Hermes

As soon as Hermes locks pictures, videos, documents, databases, and other data, it drops two ransom notes – DECRYPT_INFO.txt, as well as DECRYPT_INFORMATION.html. These messages from hackers inform victims that they need to write an email to or email address to find out the redemption price, which is paid in Bitcoin or another cryptocurrency.

Download Removal Toolto remove Hermes

Additionally, users are also provided UNIQUE_ID_DO_NOT_REMOVE identicator they need to forward to the attackers. Nevertheless, the initial version of the virus is decryptable, so all users have to do is remove Hermes ransomware from their devices and then recover all the data back for free.

How does Hermes works

How can I restore .Hrm files? 16/11/18 1 Can I restore files with .Hermes extension? 11/12/17 1 I have this Hermes ransomware thing going on 15/02/17 1

In 2018, researchers spotted Hermes 2.1 ransomware being spread with the help of CVE-2018-4878 Flash player vulnerability in the malspam campaigns. In 2019, HermesVirus HT ransomware, which is based on Marozka virus, was found using .Hermes file extension, although these two strings are not related in any way.

Spam emails; Fake updates; Hacked sites; Web injects; Brute-forcing; Software cracks, etc.

Interestingly, specialists have unraveled evidence suggesting that the malware might have originated from North Korea. The infamous hackers’ Group Lazarus, associated with this country, is said to have exploited the ransomware to hide tracks of the attack on Far Eastern International Bank (FEIB) located in Taiwan.

If hijack process is successful, Hermes virus encodes data on the computer using encryption algorithms – the procedure lasts only a few minutes. As a result, all affected data becomes inaccessible to the owners, and the only way to retrieve files is by employ specific decryption tools developed by hackers.

However, many computer users are used to computer slowdowns and do not pay attention to them unless they last for a very long time. Once the virus finished its dirty work, it puts some information in a .Html file called DECRYPT_INFORMATION.html and also creates a UNIQUE_ID_DO_NOT_REMOVE file on the desktop.

Fraudsters say that the victim can test the decryption tool by sending three files as well as unique victim’S ID to criminals via email provided in the ransom note – If you have been attacked by this particular Hermes ransomware, please do not panic and wait until malware analysts analyze the sample of this virus.

Download Removal Toolto remove Hermes

It turns out that this ransomware has a flaw that allows to find out what the decryption key is, based on the encryption key. Cybersecurity researcher Michael Gillespie managed to create an official decryption tool, allowing to recover all the locked files for free. Please refer to the bottom section of this article for more details.

Before you proceed with file recovery, you need to make sure that Hermes ransomware removal is performed successfully. To do that, enter Safe Mode with Networking and perform a full system scan with the help of the anti-malware program, such as or Combo Cleaner.

How to delete Hermes

Hermes 2.0 ransomware was released in April. It employs RSA-2048 cipher to encode data. After the process is finished, it launches DECRYPT_INFORMATION.html file which displays the message that all users data has been encoded. In order to retrieve the files, they are urged to pay the ransom in bitcoins and acquire Hermes 2.0 decryptor software. It also provides two single-use email addresses for victims in case they encounter technical difficulties. This version deletes shadow volume copies.

Hermes 2.1 ransomware continues the tradition of deleting the latter copies. The ransom note is identical to the previous version except the title now mentions “Hermes 2.1 ransomware.†It also drops the file named the same way as the former version – UNIQUE_ID_DO_NOT_REMOVE file which contains victim’S ID.

This version also provides two newly generated email addresses: and This latest version also includes a code launching the mp3 file which plays Vivaldi’S Spring composition.

Ransomware viruses are spread using a number of techniques such as malvertising, spam emails, social engineering, pirated software bundles and so on. You can get the virus after opening an infected email attachment, link sent by an unknown person or even your friend on social media sites, or after installing a software crack.

Scammers find more and more ways to deceive victims on a daily basis, and it can be hard to keep up with the latest malware distribution trends all time.

To avoid ransomware, we simply advise you to stay away from suspicious content online and protect your PC with proper security tools such as anti-malware and antivirus. The most important thing is to get yourself covered in time and create some data backups prior to malware infection.

If you have discovered Hermes virus on your system, we suggest removing it as soon as possible. It seems that you have already done a little digging and consequently you came across this website for information about Hermes removal – that is a good start. We provide instructions on how to remove Hermes ransomware down below.

Please do not attempt to delete this malicious virus by yourself because you can easily delete important files, which would result in various computer stability problems.

Download Removal Toolto remove Hermes

Stage 1: Delete Browser Extension

First of all, we would recommend that you check your browser extensions and remove any that are linked to Hermes. A lot of adware and other unwanted programs use browser extensions in order to hijacker internet applications.

Remove Hermes Extension from Google Chrome

  1. Launch Google Chrome.
  2. In the address bar, type: chrome://extensions/ and press Enter.
  3. Look for Hermes or anything related to it, and once you find it, press ‘Remove’.

Uninstall Hermes Extension from Firefox

  1. Launch Mozilla Firefox.
  2. In the address bar, type: about:addons and press Enter.
  3. From the menu on the left, choose Extensions.
  4. Look for Hermes or anything related to it, and once you find it, press ‘Remove’.

Delete Hermes Extension from Safari

  1. Launch Safari.
  2. Press on the Safari Settings icon, which you can find in the upper-right corner.
  3. Select Preferences from the list.
  4. Choose the Extensions tab.
  5. Look for Hermes or anything related to it, and once you find it, press ‘Uninstall’.
  6. Additionally, open Safari Settings again and choose Downloads.
  7. If Hermes.safariextz appears on the list, select it and press ‘Clear’.

Remove Hermes Add-ons from Internet Explorer

  1. Launch Internet Explorer.
  2. From the menu at the top, select Tools and then press Manage add-ons.
  3. Look for Hermes or anything related to it, and once you find it, press ‘Remove’.
  4. Reopen Internet Explorer.In the unlikely scenario that Hermes is still on your browser, follow the additional instructions below.
  5. Press Windows Key + R, type appwiz.cpl and press Enter
  6. The Program and Features window will open where you should be able to find the Hermes program.
  7. Select Hermes or any other recently installed unwanted entry and press ‘Uninstall/Change’.

Alternative method to clear the browser from Hermes

There may be cases when adware or PUPs cannot be removed by simply deleting extensions or codes. In those situations, it is necessary to reset the browser to default configuration. In you notice that even after getting rid of weird extensions the infection is still present, follow the below instructions.

Use Chrome Clean Up Tool to Delete Hermes

  1. Launch Google Chrome.
  2. In the address box, type: chrome://settings/ and press Enter.
  3. Expand Advanced settings, which you can find by scrolling down.
  4. Scroll down until you see Reset and Cleanup.
  5. Press on Clean up computer. Then press Find.

This Google Chrome feature is supposed to clear the computer of any harmful software. If it does not detect Hermes, go back to the Clean up computer and reset settings.

Reset Mozilla Firefox to Default

If you still find Hermes in your Mozilla Firefox browser, you should be able to get rid of it by restoring your Firefox settings to default. While extensions and plug-ins will be deleted, this will not touch your browser history, bookmarks, saved passwords or Internet cookies.

  1. Launch Mozilla Firefox
  2. Into the address box, type: about:support and press Enter.
  3. You will be redirected to a Troubleshooting Information page.
  4. From the menu on the right side, select Refresh Firefox.
  5. Confirm your choice by clicking Refresh Firefox in the new window.
  6. Your browser will close automatically in order to successfully restore the settings.
  7. Press Finish.

Reset Safari Browser to Normal Settings

  1. Launch Safari.
  2. Press on the Safari Settings icon, which you can find in the upper-right corner.
  3. Press Reset Safari.
  4. A new window will appear. Select the boxes of what you want to reset or use the screenshot below to guide you. Once you have selected everything, press ‘Reset’.
  5. Restart Safari.

Restore Internet Explorer to Default Settings

  1. Launch Internet Explorer.
  2. From the top menu, press on Tools and then Internet Options.
  3. In the new window that opens, choose the Advanced tab.
  4. At the bottom of the window, below Reset Internet settings, there will be a ‘Reset’ button. Press that.

While extensions and plug-ins will be deleted, this will not touch your browser history, bookmarks, saved passwords or Internet cookies.

Leave a Reply

Your email address will not be published. Required fields are marked *