Open Nav
Sign Up

N3TW0RM Ransomware IOCS

Oran Cohen

May 5, 2021

Updated: 15:00 GMT 09/05/21

A new ransomware attack group called N3tw0rm is claiming to have penetrated the network of several Israeli companies included Veritas, an international shipping and logistics company, Ecolog, an infrastructure engineering company, and Israel’s branch of clothing retailer H&M. In a departure from previous behavior, a source familiar with the matter stated that after encryption the threat actors did not send H&M a ransom demand since their aim is to embarrass H&M.

N3tw0rm ransomware origins

There is speculation that this N3tw0rm group is associated with Iran. If confirmed, the group will be operating hot on the heels of Pay2Key, a group that attacked numerous companies including Intel, Portnox and IAI back in December 2020. OP Innovate was at the forefront of Israel’s response to Pay2Key and verifies that this new attack exhibits similarities in the MO of the Pay2Key attack. It may be timed to coincide with Israel’s upcoming Jerusalem Day. OP Innovate has put together a list of IOCs (indicators of compromise) we have been able to identify from our investigations so far:

IndicatorsTagsComments
8080PortPort between internal secondary and internal primary
C:\Windows\Temp\n3tw0rm\Slave.exe Path, File 
8C6FD14084820EC528749300222097D21197659535AAA50CDCC75831F73546C1 SHA256 
4AC7B7A9992CFD83912DC912105D615CMD5 
C:\Windows\Temp\n3tw0rm\FreeSpaceWorker.exePath, File 
B1B8DBA2291604B968482D65B6B53142B1BF50A8D5B7CD0D652E9C6BF6A3E1BBSHA256 
paexec-[#####]-[computername].exeFileTool in use (# are for random numbers)
85.203.15.19IP AddressC&C – Express VPN
85.203.15.35IP AddressC&C – Express VPN
s.exeFileServer
pp64.exeFilePypykatz
078667339385F3B77AEA2023C8FF9DB373841741SHA256Pypykatz hash

Protect yourselves from ransomware gangs

For more information on how OP Innovate‘s cybersecurity expertise can help protect your company’s vital assets from falling into the wrong hands, contact Shay Pinsker at shay@op-c.net.

Written by Oran Cohen, Chief Security Officer at OP innovate

Resources highlights

SonicWall SMA 1000 Privilege Escalation: CVE-2025-40602

Threat actors are actively exploiting a privilege escalation vulnerability affecting SonicWall Secure Mobile Access (SMA) 1000 series appliances. The vulnerability, tracked as CVE-2025-40602, stems from…

Read more >

CVE-2025-40602

Active Exploitation of Fortinet FortiCloud SSO Authentication Bypass (CVE-2025-59718 & CVE-2025-59719)

Threat actors are actively exploiting two critical authentication bypass vulnerabilities in Fortinet products by abusing FortiCloud SSO functionality. The flaws, tracked as CVE-2025-59718 & CVE-2025-59719…

Read more >

CVE-2025-59718 & CVE-2025-59719

Apple WebKit Zero-Day Exploited in Targeted Attacks (CVE-2025-14174)

Apple has released emergency security updates to address CVE-2025-14174, a zero-day vulnerability in WebKit that has been actively exploited in the wild as part of…

Read more >

CVE-2025-14174

React2Shell (CVE-2025-55182): Critical React RCE With Active China-Linked Exploitation

CVE-2025-55182, also known as React2Shell, is a critical unauthenticated remote-code-execution vulnerability in React Server Components (RSC) that allows attackers to execute arbitrary code on the…

Read more >

react2shell

OWASP Top 10 2025: Changes, Challenges, and What They Mean for Web App Security

The Open Web Application Security Project (OWASP) has released an updated OWASP Top 10 list for the first time in four years.  This list is…

Read more >

OWASP Top 10 2025

Securing Active Directory: Lessons From the Field

Active Directory interconnects users, devices, and servers in an enterprise, making it a high-value target for attackers. A breach in AD can grant adversaries the…

Read more >

Securing Active Directory
Under Cyber Attack?

Fill out the form and we will contact you immediately.