computer security info  Blog's Page

Back To Blog

How To Remove Osiris Ransomware (Removal Guide)


  Category:  RANSOMWARE | 18th February 2026 | Author:  CSI'S TEAM

computer security info

Introduction

Osiris Ransomware Is A Well-known Strain Of Crypto-ransomware That Emerged In Late 2016 As A Variant Of The Infamous Locky Ransomware Family. It Quickly Became One Of The Most Widespread And Destructive Ransomware Campaigns Of Its Time, Targeting Businesses, Healthcare Institutions, And Individual Users Worldwide. Like Its Predecessor, Osiris Was Designed To Encrypt Files On Infected Systems And Demand A Ransom Payment—typically In Cryptocurrency—in Exchange For A Decryption Key.

This Article Provides A Comprehensive Overview Of Osiris Ransomware, Including Its Origins, Infection Methods, Technical Behavior, Impact, Prevention Strategies, And Broader Cybersecurity Implications.

1. Background And Origins

Osiris Ransomware Appeared Around September 2016 As Part Of The Evolving Locky Ransomware Ecosystem. Locky Had Already Gained Global Notoriety Earlier That Year For Infecting Hundreds Of Thousands Of Computers Through Large-scale Spam Campaigns. Cybercriminals Frequently Updated Locky With New Variants To Evade Detection By Security Software, And Osiris Was One Such Iteration.

The Name “Osiris” Was Derived From The File Extension Appended To Encrypted Files (.osiris). Later Variants In The Same Ransomware Family Used Different Extensions Such As .odin, .thor, And .aesir, Often Referencing Mythological Figures.

Osiris Did Not Represent An Entirely New Ransomware Platform But Rather An Evolved Version Of Locky With Modified Encryption Routines, Updated Communication Protocols, And Improved Anti-analysis Mechanisms.

2. How Osiris Ransomware Spreads

Osiris Relied Heavily On Large-scale Phishing And Malspam Campaigns. Attackers Distributed Millions Of Malicious Emails Daily, Often Impersonating Legitimate Organizations.

2.1 Email Attachments

The Primary Infection Vector Was Spam Emails Containing:

  • Microsoft Word Documents With Malicious Macros

  • JavaScript (.js) Files

  • ZIP Archives Containing Script Files

  • PDF Attachments With Embedded Malicious Links

Victims Were Typically Tricked Into Enabling Macros In Word Documents. Once Enabled, The Macro Downloaded The Ransomware Payload From A Remote Command-and-control (C2) Server.

2.2 Exploit Kits

Osiris Was Also Distributed Through Exploit Kits Such As:

  • Neutrino Exploit Kit

Exploit Kits Were Hosted On Compromised Websites And Automatically Scanned Visitors’ Systems For Vulnerabilities. If A Vulnerability Was Found—often In Outdated Browsers Or Plugins—the Ransomware Was Silently Installed.

2.3 Botnets

Some Campaigns Leveraged Botnets Like:

  • Dridex

Dridex-infected Machines Were Used To Distribute Spam Emails Or Download Secondary Payloads, Including Osiris.

3. Technical Behavior

Once Executed, Osiris Performed A Series Of Actions To Establish Persistence, Encrypt Files, And Demand Ransom.

3.1 System Modifications

Osiris Typically:

  • Created Registry Entries For Persistence

  • Deleted Shadow Volume Copies To Prevent File Recovery

  • Disabled Windows Recovery Options

  • Modified Firewall Rules In Some Cases

By Removing Backup Copies And System Restore Points, Osiris Made It Significantly Harder For Victims To Recover Data Without Paying The Ransom.

3.2 Encryption Process

Osiris Used A Combination Of:

  • AES (Advanced Encryption Standard) For File Encryption

  • RSA Public-key Cryptography For Encrypting The AES Key

The Ransomware Scanned Local Drives, Network Shares, And Removable Media For Specific File Types. It Targeted:

  • Documents (.doc, .docx, .xls, .pdf)

  • Databases

  • Images

  • Archives

  • Source Code Files

After Encryption, Files Were Renamed With The .osiris Extension.

3.3 Ransom Note

After Encryption, Osiris:

  • Changed The Desktop Wallpaper

  • Created Ransom Note Files (often Named _README.html Or Similar)

  • Provided Instructions To Access A Tor Payment Page

Victims Were Directed To Download The Tor Browser And Access A Payment Portal Hosted On The Tor Network. The Ransom Demand Typically Ranged From 0.5 To 2 Bitcoin, Depending On The Campaign.

4. Command And Control Infrastructure

Osiris Communicated With Remote C2 Servers To:

  • Transmit Encryption Keys

  • Register Infected Systems

  • Receive Operational Instructions

Communication Often Used HTTP POST Requests To Compromised Servers. The Infrastructure Was Frequently Rotated To Avoid Takedown Efforts.

Tor-based Payment Portals Ensured Anonymity For Attackers And Complicated Law Enforcement Investigations.

5. Impact And Global Reach

Osiris Caused Widespread Disruption Across Industries, Particularly In:

  • Healthcare

  • Education

  • Manufacturing

  • Government Institutions

One Reason For Its Success Was The Scale Of Its Spam Campaigns. At Its Peak, Millions Of Malicious Emails Were Sent Daily.

Many Organizations Experienced:

  • Temporary Operational Shutdowns

  • Loss Of Critical Data

  • Financial Losses From Ransom Payments

  • Reputational Damage

While Exact Financial Damage Is Difficult To Quantify, Ransomware Campaigns Like Osiris Contributed Significantly To The Global Rise In Cybercrime Costs During 2016–2017.

6. Why Osiris Was So Effective

Several Factors Contributed To Osiris's Success:

6.1 Social Engineering

Attackers Crafted Convincing Phishing Emails Impersonating:

  • Banks

  • Delivery Services

  • Government Agencies

  • HR Departments

The Human Element Remained The Weakest Link In Cybersecurity Defenses.

6.2 Polymorphism

Osiris Variants Frequently Changed File Hashes And Encryption Signatures, Making Detection Via Traditional Signature-based Antivirus Solutions Challenging.

6.3 Use Of Macros

At The Time, Many Organizations Still Allowed Office Macros, Enabling Easy Execution Of Malicious Code.

6.4 Robust Encryption

Without Access To The Private RSA Key Held By Attackers, Decrypting Files Was Practically Impossible.

7. Prevention And Mitigation

Organizations And Individuals Can Reduce Ransomware Risk Through Layered Security Strategies.

7.1 Email Security

  • Implement Advanced Email Filtering

  • Disable Macros By Default

  • Use Sandboxing For Attachments

  • Train Employees On Phishing Awareness

7.2 Patch Management

Regularly Update:

  • Operating Systems

  • Browsers

  • Plugins

  • Server Software

This Reduces Exposure To Exploit Kits.

7.3 Backup Strategy

The Most Effective Defense Against Ransomware Is Maintaining Secure Backups:

  • Use Offline Backups

  • Test Restore Procedures Regularly

  • Follow The 3-2-1 Rule (3 Copies, 2 Media Types, 1 Offsite)

7.4 Endpoint Protection

Modern EDR (Endpoint Detection And Response) Systems Can Detect Suspicious Behavior Like:

  • Mass File Encryption

  • Registry Modifications

  • Shadow Copy Deletion

7.5 Network Segmentation

Separating Networks Prevents Ransomware From Spreading Laterally Across Systems.

8. Should Victims Pay The Ransom?

Law Enforcement Agencies Generally Advise Against Paying Ransom Because:

  • Payment Funds Criminal Activity

  • No Guarantee Of Decryption

  • Victims May Be Targeted Again

However, Some Organizations Have Paid Ransom When Backups Were Unavailable And Operational Impact Was Severe.

In Later Years, Law Enforcement Agencies Improved Ransomware Tracking, But During Osiris’s Peak Period, Decryption Tools Were Not Available For Victims.

9. Evolution Of The Locky/Osiris Family

After Osiris, The Locky Operators Released Additional Variants Such As:

  • Odin

  • Thor

  • Aesir

These Variants Continued Evolving Encryption Routines And Distribution Methods.

By 2017, Locky Activity Began To Decline, Possibly Due To:

  • Law Enforcement Pressure

  • Shifts To Other Ransomware Families

  • Infrastructure Takedowns

However, The Techniques Pioneered By Locky And Osiris Influenced Many Later Ransomware Groups.

10. Lessons Learned From Osiris

The Osiris Campaign Reinforced Several Cybersecurity Lessons:

  1. Human Error Is A Major Vulnerability.

  2. Backups Are Essential.

  3. Ransomware Evolves Rapidly.

  4. Email Remains A Primary Attack Vector.

  5. Proactive Defense Is More Effective Than Reactive Response.

11. Broader Impact On Cybersecurity

The Success Of Osiris And Related Ransomware Strains Contributed To:

  • Increased Investment In Cybersecurity Tools

  • Growth Of Ransomware-as-a-service (RaaS) Models

  • Expansion Of Cyber Insurance Markets

  • Stronger Regulatory Compliance Requirements

Governments Worldwide Began Prioritizing Ransomware Response Frameworks Following Widespread Incidents During 2016–2018.

12. Conclusion

Osiris Ransomware Represents A Significant Chapter In The Evolution Of Modern Cybercrime. As A Variant Of Locky, It Demonstrated How Quickly Ransomware Operators Adapt To Security Measures And Expand Their Campaigns. Through Aggressive Spam Distribution, Strong Encryption Methods, And Anonymized Payment Systems, Osiris Inflicted Substantial Damage On Victims Worldwide.

Although Active Campaigns Have Largely Subsided, The Techniques Used By Osiris Continue To Influence Contemporary Ransomware Operations. Its Legacy Serves As A Reminder That Cybersecurity Requires Continuous Vigilance, Education, And Layered Defense Strategies.

Understanding Historical Threats Like Osiris Is Critical For Anticipating Future Attacks And Strengthening Digital Resilience In An Increasingly Connected World.

Malware Removal Guide For PC

Malware Removal Guide For Web Browsers

Prevent Future Malware

Summary - Malware Removal Guide

Guide For VPN Uses

Malware Removal Guide – PC And Web Browser

PART 1: Remove Malware From Your PC (Windows)

Step 1: Boot Into Safe Mode

  • Restart Your PC And Press F8 (or Shift + F8 For Some Systems) Before Windows Loads.

  • Choose Safe Mode With Networking.

Safe Mode Prevents Most Malware From Loading.

Step 2: Uninstall Suspicious Programs

  1. Press Win + R, Type appwiz.cpl, And Press Enter.

  2. Sort By Install Date And Uninstall Unknown Or Recently Added Programs.

Step 3: Run A Malware Scan

Use A Trusted Anti-malware Tool:

Malwarebyteshttps://www.malwarebytes.com

Screenshot Of Malwarebytes - Visit Links

Microsoft Defender – Built Into Windows 10/11

Bitdefender GravityZone Business Security

Emsisoft Anti-Malware Home

HitmanPro, ESET Online Scanner, Or Kaspersky Virus Removal Tool

ZoneAlarm Pro Antivirus + Firewall NextGen

VIPRE Antivirus - US And Others Countries, | India

VIPRE Antivirus - Mac

F-Secure Total - Global

Run A Full Scan And Delete/quarantine Detected Threats.

Step 4: Delete Temporary Files

  1. Press Win + R, Type temp → Delete All Files.
  2. Press Win + R, Type %temp% → Delete All Files.

  3. Use Disk Cleanup: cleanmgr In The Run Dialog.

Step 5: Reset Hosts File

  1. Go To: C:\Windows\System32\drivers\etc

  2. Open hosts File With Notepad.

  3. Replace With Default Content:

Step 6: Check Startup Programs

  1. Press Ctrl + Shift + Esc → Open Task Manager

  2. Go To Startup Tab

  3. Disable Any Suspicious Entries.

Step 7: Reset Network Settings

  1. Open Command Prompt As Administrator.

  2. Run These Commands:

netsh Winsock Reset

netsh Int Ip Reset

ipconfig /flushdns

PART 2: Remove Malware From Web Browsers

? Common Signs Of Malware In Browser:

  • Unwanted Homepage Or Search Engine

  • Pop-ups Or Redirects

  • Unknown Extensions Installed

Step 1: Remove Suspicious Extensions

For Chrome:

  • Go To: chrome://extensions/

  • Remove Anything Unfamiliar

For Firefox:

  • Go To: about:addons → Extensions

  • Remove Suspicious Add-ons

For Edge:

  • Go To: edge://extensions/

  • Uninstall Unknown Add-ons

Step 2: Reset Browser Settings

Chrome:

  • Go To chrome://settings/reset → "Restore Settings To Their Original Defaults"

Firefox:

  • Go To about:support → "Refresh Firefox"

Edge:

  • Go To edge://settings/resetProfileSettings → "Reset Settings"

Step 3: Clear Cache And Cookies

All Browsers:

  • Use Ctrl + Shift + Del → Select All Time

  • Clear Cookies, Cached Files, And Site Data

Step 4: Check Search Engine & Homepage Settings

Make Sure They Are Not Hijacked.

  • Chrome: chrome://settings/search

  • Firefox: about:preferences#search

  • Edge: edge://settings/search

Step 5: Use Browser Cleanup Tools (Optional)

  • Chrome: chrome://settings/cleanup

  • Use Malwarebytes Browser Guard For Real-time Browser Protection.

FINAL TIPS: Prevent Future Malware

  • Always Download Software From Trusted Sources.

  • Keep Windows, Browsers, And Antivirus Updated.

  • Avoid Clicking Suspicious Links Or Ads.

  • Use ad Blockers And reputable Antivirus Software.

  • Backup Your Files Regularly.

Short Summary: Malware Removal Guide (PC & Web Browser)

To Remove Malware From Your Windows PC, Start By Booting Into Safe Mode, Uninstalling Suspicious Programs, And Scanning With Trusted Anti-malware Tools Like Malwarebytes. Clear Temporary Files, Reset Your Network Settings, And Check Startup Apps For Anything Unusual.

For web Browsers, Remove Unwanted Extensions, Reset Browser Settings, Clear Cache And Cookies, And Ensure Your Homepage And Search Engine Haven’t Been Hijacked. Use Cleanup Tools Like Chrome Cleanup Or Browser Guard For Added Protection.

?? Prevention Tips: Keep Software Updated, Avoid Suspicious Downloads, And Use Antivirus Protection Plus Browser Ad Blockers. Regular Backups Are Essential.

VPN - How To Use IT

1. Choose A Trusted VPN Provider

  • Why It Matters: Not All VPNs Offer Malware Protection.

  • What To Look For: Providers With built-in Malware/ad/tracker Blockers (e.g., NordVPN’s Threat Protection, ProtonVPN’s NetShield).

  • Nord VPN
  • Hide.me VPN

2. Enable Kill Switch

  • Purpose: Prevents Data Leaks If Your VPN Connection Drops.

  • Benefit: Ensures Your Real IP And Browsing Activity Aren’t Exposed To Malware-distributing Websites.

3. Use VPN With DNS Leak Protection

  • Why It Matters: DNS Leaks Can Expose Your Online Activity To Attackers.

  • Solution: Enable DNS Leak Protection In Your VPN Settings Or Use A Secure DNS Like Cloudflare (1.1.1.1).

4. Avoid Free VPNs

  • Risk: Free VPNs Often Contain Malware, Sell User Data, Or Lack Security Features.

  • Better Option: Use Reputable Paid VPNs That Offer security Audits And Transparent Privacy Policies.

5. Use VPN With Anti-Phishing Tools

  • Some VPNs Block Known Phishing And Malicious Sites.

  • Example: Surfshark’s CleanWeb, CyberGhost’s Content Blocker.

6. Keep Your VPN App Updated

  • Reason: Security Patches Fix Known Vulnerabilities.

  • Tip: Enable Auto-updates Or Check For Updates Weekly.

. Use VPN On All Devices

  • Scope: Malware Can Enter Through Phones, Tablets, Or IoT Devices.

  • Solution: Install VPN Apps On Every Internet-connected Device.

8. Don’t Rely On VPN Alone

  • Fact: VPNs Do Not Remove Or Detect Malware On Your System.

  • Complement It With:

    • Antivirus Software

    • Firewall

    • Browser Extensions For Script Blocking

9. Avoid Clicking Unknown Links While VPN Is On

  • VPN Encrypts Traffic But Can’t Stop Malware From Executing If You Download Infected Files.

10. Use VPN With Split Tunneling Cautiously

  • Split Tunneling Allows Certain Apps/sites To Bypass VPN.

  • Tip: Never Exclude Browsers, Email Clients, Or Download Managers From VPN Tunneling.

Short Note - VPN Uses

A VPN (Virtual Private Network) Enhances Your Online Privacy By Encrypting Your Internet Traffic And Masking Your IP Address. It Protects Your Data On Public Wi-Fi, Hides Browsing Activity From Hackers And ISPs, And Helps Bypass Geo-restrictions. VPNs Also Add A Layer Of Defense Against Malware By Blocking Malicious Websites And Trackers When Using Advanced Features. However, A VPN Does Not Remove Existing Malware Or Act As Antivirus Software. For Full Protection, Combine VPN Use With Antivirus Tools, Regular Software Updates, And Cautious Browsing Habits. Always Choose A Reputable VPN Provider With Strong Security And Privacy Policies.

Osiris Ransomware, Remove Osiris Ransomware, Delete Osiris Ransomware, Uninstall Osiris Ransomware, Osiris Ransomware Removal, Get Rid Of Osiris Ranso