NoEscape attacks Beijer Ref

Incident Date:

July 27, 2023

World map

Overview

Title

NoEscape attacks Beijer Ref

Victim

Beijer Ref

Attacker

Noescape

Location

Madrid, Spain

, Spain

First Reported

July 27, 2023

The NoEscape Ransomware Attack on Beijer Ref

The NoEscape ransomware gang has attacked Beijer Ref. Beijer Ref AB is a global company based in Sweden that specializes in the distribution and trading of refrigeration and air conditioning products. The company was founded in 1866 and has since become a significant player in the HVAC&R (Heating, Ventilation, Air Conditioning, and Refrigeration) industry. Beijer Ref operates as a wholesale distributor, supplying a wide range of products related to refrigeration and air conditioning systems. This includes components such as compressors, condensers, evaporators, controls, and other essential parts used in various cooling and climate control applications.

NoEscape's Claim and Theft

NoEscape posted the Spanish arm of Beijer Ref on July 27th, claiming to have stolen 5GB of contracts, passports and ID cards, certificates, and more.

Introduction to NoEscape Ransomware

Researchers have identified a new Ransomware-as-a-service operation known as NoEscape. The ransomware builder interface allows affiliates to customize various settings when creating the ransomware executables. However, the primary function of NoEscape is to encrypt files.

Victim Notification and Demands

Victims of NoEscape receive a note informing them that their network has been breached and infected by a group called NoEscape. The message reveals that their company documents, databases, and other crucial files have been encrypted. The perpetrators have also obtained the victims' confidential documents, personal data, and sensitive information. To regain access to their files, the victims are instructed to make a payment in exchange for a special recovery tool. Non-compliance with this demand will result in the victims' files remaining encrypted indefinitely and the stolen information being offered for sale on the darknet.

Payment Instructions

To facilitate the payment process, the victims are advised to download and install the TOR browser and access a specific link provided in the note. They must then enter their ID and follow the accompanying instructions. The directive explicitly warns the victims against making any modifications or attempting file recovery on their own, emphasizing that only the perpetrators possess the ability to restore the encrypted files.

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.