NoEscape attacks McKeag & Co Solicitors

Date:

October 31, 2023

World map

Overview

Title

NoEscape attacks McKeag & Co Solicitors

Victim

McKeag & Co Solicitors

Attacker

NoEscape

Location

Newcastle upon Tyne, United Kingdom

Newcastle upon Tyne,

Size of Attack

Unknown/TBD

First Reported

October 31, 2023

Last Updated

March 20, 2023

NoEscape confirmed ransomware attack against McKeag & Co Solicitors. McKeag & Co are a long established legal practice located in Newcastle upon Tyne in the North East of England, offering a wide range of legal services. NoEscape – assessed to be a spinoff of the disbanded Avaddon gang - emerged in May of 2023 and operates as a Ransomware-as-a-Service (RaaS) and emerged with variants for targeting both Windows, Linux and VMware ESXi systems. NoEscape provides affiliates with 24/7 technical support, communications, negotiation assistance, as well as an automated RaaS platform update feature. Having just recently emerged, NoEscape has rapidly become one of the more prolific attack groups, with attack volume escalating significantly in the second quarter of 2023. IT is unclear how high the typical NoEscape ransom demands tend to be, but it has been observed that profit sharing with affiliates is on par or even more attractive than other groups with ransoms over $3 million netting 90/10 split with affiliates taking the lion’s share. NoEscape is written in C++ and is relatively unique in the space in that the developers opted to build the RaaS platform from scratch rather than rely on code re-use from other ransomware variants. NoEscape ransomware payloads support multiple encryption options ranging from extra fast to extra strong encryption and leverages RSA and ChaCHA20 encryption algorithms with a single key for all impacted files for faster decryption of a ransom is paid. NoEscape can operate in safe mode to bypass security tools, terminates processes, erases VSS shadow copies and system back-ups to thwart recovery effortsd, and abuses Windows Restart Manager to circumvent processes not terminated. NoEscape operations target a wide array of industry verticals with a focus on Professional Services, Manufacturing, Information Technology and Healthcare. NoEscape offers it’s RaaS platform to affiliate attackers and operations typically include data exfiltration or other actions to be leveraged in double extortion schemes such as a denial-of-service option for a hefty additional fee to the affiliate. NoEscape maintains a TOR-based leaks site to name-and-shame victims.

Oh no!

This attack's description was not found, while we work on the detailed account of this attack we invite you to browse through other recent Rasomware Attacks in the table below.

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.

8Base attacks YRW Limited
Date
February 7, 2024
Ransomware group
8Base
Location

Tauranga, New Zealand

, New Zealand

Industry
Professional, Scientific & Technical Services
Victim
YRW Limited
8Base attacks YRW Limited
Date
February 7, 2024
Ransomware group
8Base
Location

Tauranga, New Zealand

, New Zealand

Industry
Professional, Scientific & Technical Services
Victim
YRW Limited
LockBit attacks Vimar Equipment
Date
February 7, 2024
Ransomware group
LockBit
Location

Burnaby, Canada

British Colombia, Canada

Industry
Manufacturing
Victim
Vimar Equipment
LockBit attacks Vimar Equipment
Date
February 7, 2024
Ransomware group
LockBit
Location

Burnaby, Canada

British Colombia, Canada

Industry
Manufacturing
Victim
Vimar Equipment
8Base attacks CERALP
Date
February 7, 2024
Ransomware group
8Base
Location

Villefranche sur Saône, France

Rhone, France

Industry
Professional, Scientific & Technical Services
Victim
CERALP
8Base attacks CERALP
Date
February 7, 2024
Ransomware group
8Base
Location

Villefranche sur Saône, France

Rhone, France

Industry
Professional, Scientific & Technical Services
Victim
CERALP
Cactus attacks SPB Globa
Date
February 6, 2024
Ransomware group
Cactus
Location

Huévar del Aljarafe, Spain

Seville, Spain

Industry
Manufacturing
Victim
SPB Global
Cactus attacks SPB Globa
Date
February 6, 2024
Ransomware group
Cactus
Location

Huévar del Aljarafe, Spain

Seville, Spain

Industry
Manufacturing
Victim
SPB Global
Play attacks Virgin Islands Lottery
Date
February 6, 2024
Ransomware group
Play
Location

St Thomas,

,

Industry
Other
Victim
Virgin Islands Lottery
Play attacks Virgin Islands Lottery
Date
February 6, 2024
Ransomware group
Play
Location

St Thomas,

,

Industry
Other
Victim
Virgin Islands Lottery
Black Basta attacks Asecos
Date
February 6, 2024
Ransomware group
BlackBasta
Location

Gründau, Germany

, Germany

Industry
Other
Victim
Asecos
Black Basta attacks Asecos
Date
February 6, 2024
Ransomware group
BlackBasta
Location

Gründau, Germany

, Germany

Industry
Other
Victim
Asecos
LockBit attacks Logtainer
Date
February 5, 2024
Ransomware group
LockBit
Location

Milan, Italy

, Italy

Industry
Transportation & Warehousing
Victim
Logtainer
LockBit attacks Logtainer
Date
February 5, 2024
Ransomware group
LockBit
Location

Milan, Italy

, Italy

Industry
Transportation & Warehousing
Victim
Logtainer
LockBit attacks Portline
Date
February 5, 2024
Ransomware group
LockBit
Location

Lisbon, Portugal

, Portugal

Industry
Transportation & Warehousing
Victim
Portline
LockBit attacks Portline
Date
February 5, 2024
Ransomware group
LockBit
Location

Lisbon, Portugal

, Portugal

Industry
Transportation & Warehousing
Victim
Portline
LockBit attacks TGestiona Logistica Company
Date
February 5, 2024
Ransomware group
LockBit
Location

Sertãozinho Maua, Brazil

, Brazil

Industry
Transportation & Warehousing
Victim
TGestiona Logística Company
LockBit attacks TGestiona Logistica Company
Date
February 5, 2024
Ransomware group
LockBit
Location

Sertãozinho Maua, Brazil

, Brazil

Industry
Transportation & Warehousing
Victim
TGestiona Logística Company
LockBit attacks Prima
Date
February 5, 2024
Ransomware group
LockBit
Location

Fresno,

California,

Industry
Agriculture
Victim
Prima
LockBit attacks Prima
Date
February 5, 2024
Ransomware group
LockBit
Location

Fresno,

California,

Industry
Agriculture
Victim
Prima