www.fortinet.com
Open in
urlscan Pro
3.123.216.247
Public Scan
URL:
https://www.fortinet.com/blog/threat-research/ransomware-roundup-noescape
Submission: On November 22 via api from DE — Scanned from DE
Submission: On November 22 via api from DE — Scanned from DE
Form analysis
1 forms found in the DOMGET /blog/search
<form class="b3-searchbox__form" action="/blog/search" method="get">
<input class="b3-searchbox__input" type="text" name="q" placeholder="Search Blogs">
<button class="b3-searchbox__icon" aria-label="Search" type="submit">
<svg viewBox="0 0 16 16" xmlns="http://www.w3.org/2000/svg">
<path
d="M15.688 14.18l-4.075-4.075C12.36 9.06 12.8 7.78 12.8 6.4 12.8 2.87 9.93 0 6.4 0 2.87 0 0 2.87 0 6.4c0 3.53 2.87 6.4 6.4 6.4 1.38 0 2.66-.44 3.705-1.187l4.075 4.075c.207.208.48.312.753.312.274 0 .547-.104.755-.312.416-.417.416-1.093 0-1.51zM2.133 6.4c0-2.357 1.91-4.267 4.267-4.267s4.267 1.91 4.267 4.267-1.91 4.267-4.267 4.267S2.133 8.757 2.133 6.4z"
fill="#fff">
</path>
</svg>
</button>
</form>
Text Content
Blog * Categories * Business & Technology * FortiGuard Labs Threat Research * Industry Trends * Partners * Customer Stories * PSIRT Blogs * Business & Technology * FortiGuard Labs Threat Research * Industry Trends * Partners * Customer Stories * PSIRT Blogs * CISO Collective * Subscribe FortiGuard Labs Threat Research RANSOMWARE ROUNDUP – NOESCAPE By Shunichi Imano and Fred Gutierrez | November 14, 2023 * Article Contents * NoEscape Ransomware Overview Infection VectorVictimologyNoEscape Ransomware ExecutionData Leak Site * Fortinet Protections * IOCs File IOCs * FortiGuard Labs Guidance Best Practices Include Not Paying a Ransom * How Fortinet Can Help By Shunichi Imano and Fred Gutierrez | November 14, 2023 On a bi-weekly basis, FortiGuard Labs gathers data on ransomware variants of interest that have been gaining traction within our datasets and the OSINT community. The Ransomware Roundup report aims to provide readers with brief insights into the evolving ransomware landscape and the Fortinet solutions that protect against those variants. This edition of the Ransomware Roundup covers the NoEscape ransomware. Affected platforms: Microsoft Windows, Linux, and ESXi Impacted parties: Microsoft Windows, Linux, and ESXi Users Impact: Encrypts and exfiltrates victims’ files and demands ransom for file decryption Severity level: High NOESCAPE RANSOMWARE OVERVIEW NoEscape is a financially motivated ransomware group that emerged in May 2023. The group runs a Ransomware-as-a-Service program. The developer creates and provides necessary pre- and post-infection tools for affiliates to perform malicious activities such as compromising victims, data exfiltration, and encryptor (ransomware) deployments. The group has victimized numerous organizations across multiple industries, including government, energy, hospitals, and physicians’ clinics. The NoEscape ransomware group is believed to be related to the now-defunct Avaddon ransomware group. INFECTION VECTOR Information on the infection vector used by the NoEscape ransomware threat actor is not currently available. However, it is not likely to differ significantly from other ransomware groups. VICTIMOLOGY According to data collected through Fortinet's FortiRecon service, the NoEscape ransomware group has targeted multiple industry verticals (Figure 1). Business services were most impacted by the ransomware, followed by the manufacturing and retail sectors. Victims of the NoEscape ransomware also include government organizations, hospitals, and medical clinics. When victim organizations are ranked according to country (Figure 2), the United States leads by a wide margin. Figure 1: Top sectors targeted by the NoEscape ransomware (source: FortiRecon) Figure 2: Top country victimized by the NoEscape ransomware (source: FortiRecon) As of November 3, 2023, the NoEscape ransomware group had last posted new victims on October 27th. NOESCAPE RANSOMWARE EXECUTION Once a network has been compromised and data has been exfiltrated, the NoEscape attacker deploys and runs a file encryptor, which terminates the following services and processes: Figure 3: Services terminated by the NoEscape ransomware Figure 4: Processes terminated by the NoEscape ransomware The ransomware encrypts files on the compromised systems and appends a “.[random 10-character uppercase alphabet]” extension to the affected files. The ransomware avoids encrypting the following file extensions: Figure 5: File extensions that the NoEscape ransomware avoids to encrypt The NoEscape ransomware also exempts the following directories from file encryption: Figure 6: File directories that the NoEscape ransomware avoids encrypting It then leaves a ransom note titled “HOW_TO_RECOVER_FILES.txt.” The ransom note instructs victims to visit a TOR site for further instructions. The actual ransom negotiation takes place on TOX. It also insists that the NoEscape ransomware group is financially driven and is not politically motivated. Figure 7: Files encrypted by the NoEscape ransomware and its ransom note Figure 8: NoEscape ransomware’s ransom note The NoEscape ransomware has variants that affect Linux and VMware ESXi. DATA LEAK SITE The NoEscape ransomware group owns a TOR site where victims can contact the threat actor. Stolen information and a list of victims are also posted there. Victims are instructed to visit the TOR site below and enter the unique personal ID listed on the ransom note. Figure 9: The NoEscape ransomware’s TOR site that victims are instructed to visit Figure 10: The contact form on the NoEscape ransomware’s TOR site As of November 3, the “NoEscape” blog lists 20 active NoEscape ransomware victims. Figure 11: Active NoEscape ransomware victims listed on the TOR site Figure 12: NoEscape ransomware victims whose "negotiations" have ended If victims do not comply with the attacker's request, another message is added to the page assigned to each victim urging action. Some of those messages are below: Figure 13: One of the messages added to the victim’s unique page Figure 14: Another message added to the victim’s unique page FORTINET PROTECTIONS Fortinet customers are already protected from this malware variant through our AntiVirus and FortiEDR services, as follows: FortiGuard Labs detects the NoEscape ransomware samples with the following AV signatures: * W32/Avaddon.H!tr.ransom * W32/Filecoder_Avaddon.E!tr.ransom * W32/Filecoder_Avaddon.H!tr * W32/Filecoder_Avaddon.H!tr.ransom * Linux/Filecoder_NoEscape.A!tr * Linux/Filecoder_NoEscape.B!tr The FortiGuard AntiVirus service is supported by FortiGate, FortiMail, FortiClient, and FortiEDR. Fortinet EPP customers running current AntiVirus updates are also protected. IOCS FILE IOCS SHA2 Note 0073414c5a03b20f6f255f400291de67f2a7268c461f90ea6ff0355ca31af07a Windows version of NoEscape ransomware 2020cae5115b6980d6423d59492b99e6aaa945a2230b7379c2f8ae3f54e1efd5 4175dae9b268fe5b4f96055ea0376417b5ddc2518d3bd11e20f0f8255bb4621e 4d7da1654f9047b6c6a9d32564a66684407ed587cbaffa54ec1185fd73293d3e 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d 53f5c2f70374696ff12adcaaf1bbbe0e5dd1b1995d98f2e876b0671888b43128 62205bf0a23e56524f2f1c44897f809457ad26bc70810008ec5486e17c7e64e2 68bce3a400721d758560273ae024f61603b8a4986440a8ec9e28305d7e6d02b0 68ff9855262b7a9c27e349c5e3bf68b2fc9f9ca32a9d2b844f2265dccd2bc0d8 73c19eab8d2ae58db3968dd7de0e745db2d7709859305b113b748bb02494465e 831a2409d45d0c7f15b7f31eddbbdfe7d58414499e81b3da7d9fdee28fafe646 8dd64ea7f226d3eb1e857b0086c0668542652cb37f8142dc000272dbd9569e31 91c515d55fae6d21b106c8c55067ce53d42bef256bd5a385cadd104cf68f64ff 9d346518330eeefbf288aeca7b2b6243bc158415c7fee3f2c19694f0e5f7d51c 10d2b5f7d8966d5baeb06971dd154dc378496f4e5faf6d33e4861cd7a26c91d7 Linux version of NoEscape ransomware 21162bbd796ad2bf9954265276bfebea8741596e8fe9d86070245d9b5f9db6da 46f1a4c77896f38a387f785b2af535f8c29d40a105b63a259d295cb14d36a561 c34c5dd4a58048d7fd164e500c014d16befa956c0bce7cae559081d57f63a243 FORTIGUARD LABS GUIDANCE Due to the ease of disruption, damage to daily operations, potential impact on an organization’s reputation, and the unwanted destruction or release of personally identifiable information (PII), etc., it is vital to keep all AV and IPS signatures up to date. Since the majority of ransomware is delivered via phishing, organizations should consider leveraging Fortinet solutions designed to train users to understand and detect phishing threats: The FortiPhish Phishing Simulation Service uses real-world simulations to help organizations test user awareness and vigilance to phishing threats and to train and reinforce proper practices when users encounter targeted phishing attacks. Our FREE NSE training: NSE 1 – Information Security Awareness includes a module on internet threats designed to help end users learn how to identify and protect themselves from various types of phishing attacks and can be easily added to internal training programs. Organizations will need to make foundational changes to the frequency, location, and security of their data backups to effectively deal with the evolving and rapidly expanding risk of ransomware. When coupled with digital supply chain compromise and a workforce telecommuting into the network, there is a real risk that attacks can come from anywhere. Cloud-based security solutions, such as SASE, to protect off-network devices; advanced endpoint security, such as EDR (endpoint detection and response) solutions that can disrupt malware mid-attack; and Zero Trust Access and network segmentation strategies that restrict access to applications and resources based on policy and context, should all be investigated to minimize risk and to reduce the impact of a successful ransomware attack. As part of the industry's leading fully integrated Security Fabric, delivering native synergy and automation across your security ecosystem, Fortinet also provides an extensive portfolio of technology and human-based as-a-service offerings. These services are powered by our global FortiGuard team of seasoned cybersecurity experts. BEST PRACTICES INCLUDE NOT PAYING A RANSOM Organizations such as CISA, NCSC, the FBI, and HHS caution ransomware victims against paying a ransom partly because the payment does not guarantee that files will be recovered. According to a US Department of Treasury's Office of Foreign Assets Control (OFAC) advisory, ransom payments may also embolden adversaries to target additional organizations, encourage other criminal actors to distribute ransomware, and/or fund illicit activities that could potentially be illegal. For organizations and individuals affected by ransomware, the FBI has a Ransomware Complaint page where victims can submit samples of ransomware activity via their Internet Crimes Complaint Center (IC3). HOW FORTINET CAN HELP FortiGuard Labs’ Emergency Incident Response Service provides rapid and effective response when an incident is detected. Our Incident Readiness Subscription Service provides tools and guidance to help you better prepare for a cyber incident through readiness assessments, IR playbook development, and IR playbook testing (tabletop exercises). Additionally, FortiRecon Digital Risk Protection (DRP), is a SaaS-based service that provides a view of what adversaries are seeing, doing, and planning, to help you counter attacks at the reconnaissance phase and significantly reduce the risk, time, and cost of later-stage threat mitigation. Tags: Ransomware Roundup, ransomware-as-a-service RELATED POSTS FortiGuard Labs Threat Research RANSOMWARE ROUNDUP - KNIGHT FortiGuard Labs Threat Research RANSOMWARE ROUNDUP - AKIRA FortiGuard Labs Threat Research RANSOMWARE ROUNDUP - RETCH AND S.H.O. * * * * * * NEWS & ARTICLES * News Releases * News Articles SECURITY RESEARCH * Threat Research * FortiGuard Labs * Threat Map * Ransomware Prevention CONNECT WITH US * Fortinet Community * Partner Portal * Investor Relations * Product Certifications COMPANY * About Us * Exec Mgmt * Careers * Training * Events * Industry Awards * Social Responsibility * CyberGlossary * Sitemap * Blog Sitemap CONTACT US * (866) 868-3678 Copyright © 2023 Fortinet, Inc. All Rights Reserved Terms of Services Privacy Policy | Cookie Settings COOKIE PREFERENCE CENTER * YOUR PRIVACY * STRICTLY NECESSARY COOKIES * PERFORMANCE COOKIES * FUNCTIONAL COOKIES * TARGETING COOKIES YOUR PRIVACY When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking certain cookies in the Functional category may impact your experience of the site and the services we are able to offer. privacy policy STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. Cookies Details PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. Cookies Details FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Cookies Details TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Cookies Details BACK BUTTON BACK Vendor Search Filter Button Consent Leg.Interest checkbox label label checkbox label label checkbox label label * 33ACROSS 33ACROSS View Third Party Cookies * Name cookie name Clear checkbox label label Apply Cancel Confirm My Choices Allow All COOKIE SETTINGS By clicking “Accept All”, you agree to use of cookies on your device to enhance site functionality, analyze site usage, and assist in our marketing efforts. The Cookies Settings link has cookie-specific detail and preference options. privacy policy Reject All Accept All Cookies Settings