The NoEscape ransomware gang has attacked Doesburg Components. Doesburg Components is a high-end cast-iron component manufacturer headquartered in Bergen, Netherlands. NoEscape posted Doesburg Components to its data leak site on June 7th, claiming to have stolen 20GB of data. NoEscape is a ransomware-as-a-service operation. The ransomware builder interface allows affiliates to customize various settings when creating the ransomware executables. However, the primary function of NoEscape is to encrypt files. Victims of NoEscape receive a note informing them that their network has been breached and infected by a group called NoEscape. The message reveals that all of their company documents, databases, and other crucial files have been encrypted. Additionally, the perpetrators have also obtained the victims' confidential documents, personal data, and sensitive information. To regain access to their files, the victims are instructed to make a payment in exchange for a special recovery tool. Non-compliance with this demand will result in the victims' files remaining encrypted indefinitely and the stolen information being offered for sale on the darknet. To facilitate the payment process, the victims are advised to download and install the TOR browser and access a specific link provided in the note. They must then enter their ID and follow the accompanying instructions. The directive explicitly warns the victims against making any modifications or attempting file recovery on their own, emphasizing that only the perpetrators possess the ability to restore the encrypted files.
This attack's description was not found, while we work on the detailed account of this attack we invite you to browse through other recent Rasomware Attacks in the table below.