Technical Breakdown:
1. File Extension & Renaming Patterns
-
Confirmation of File Extension: Files encrypted by DOXES ransomware are marked with the extension
.DOXES. -
Renaming Convention: After encryption the malware keeps the original file name and appends “.DOXES” to it (e.g.,
Report_Q4.docxbecomesReport_Q4.docx.DOXES). There is currently no embedded campaign-ID or e-mail address in the renamed files.
2. Detection & Outbreak Timeline
- Approximate Start Date/Period: DOXES was first reported by victims in mid-October 2023 with a sharp spike in submissions through the second week of November 2023, identifying it as a late-2023 campaign in the scope of ESXi-targeting “LockerGoga-like” operations.
3. Primary Attack Vectors
- Propagation Mechanisms:
-
VMware ESXi hypervisor exploitation
- Initial access gained by brute-forcing or phished ESXi admin credentials, followed by abuse of VMware APIs (
/ui/esxi/script) to upload the ELF binarydoxesordoxes_lockerdirectly into/tmp.
- Initial access gained by brute-forcing or phished ESXi admin credentials, followed by abuse of VMware APIs (
-
ProxyLogon & ProxyShell email exploitation
- Servers running outdated Exchange 2016 or 2019 instances have been observed downloading PowerShell loaders (
bb6a.ps1) that subsequently deploy DOXES.
- Servers running outdated Exchange 2016 or 2019 instances have been observed downloading PowerShell loaders (
-
Cracked software installer bundles
- DAEMON Tools Ultimate and pirated Adobe installers circulating on popular warez forums drop the Windows variant (
DOXES.exe).
- DAEMON Tools Ultimate and pirated Adobe installers circulating on popular warez forums drop the Windows variant (
-
RDP lateral movement
- In tenant networks where ESXi is already compromised, DOXES operators use WMI to push the binary over SMB (
ADMIN$orC$shares) to Windows servers/workstations to maximize reachable data volumes before encryption kicks off.
- In tenant networks where ESXi is already compromised, DOXES operators use WMI to push the binary over SMB (
Remediation & Recovery Strategies:
1. Prevention
- Proactive Measures:
- Harden ESXi root and vCenter accounts: strictly enforce 15+-character passphrases, enable built-in lock-out policy (
Security.AccountLockFailures), disable SSH if unused. - Patch Exchange, Windows and ESXi regularly; prioritize fixes against CVE-2021-34473 (ProxyShell) and VMware ESXi Advisory VMSA-2021-0010.
- Segment storage/VLANs so ESXi management, VM traffic and backup networks reside on separate networks with a deny-by-default firewall rule set.
- Restrict vSphere API endpoints (
/sdk,/ui) to only dedicated admin jump hosts via VPN and MFA. - Backups: insist on immutable or off-line backups (S3 with Object Lock, Veeam Hardened Repository). Test restores monthly.
2. Removal
- Infection Cleanup:
-
Asset isolation
- Physically or logically pull infected ESXi hosts and Windows machines from the production network.
-
Kill malicious processes
- On ESXi: use the ESXi Shell to
kill -9 $(pidof doxes)and delete/tmp/doxes*ELF binaries. - On Windows: open Safe Mode with Networking, disable the service
DoxSvcand terminate the parent powershell.exe or cmd.exe process.
- On ESXi: use the ESXi Shell to
-
Startup persistence removal
- Windows Registry: check
HKLM\Software\Microsoft\Windows\CurrentVersion\Runand remove any “doxes.exe” value. - ESXi: remove lines added by the malware to
/etc/rc.local.d/local.shor/etc/rc.localthat calldoxes.
- Windows Registry: check
-
Re-image or reinstall if tampering is extensive
- Apply a clean ESXi image from vendor media (always check SHA-256 checksums).
- Patch the exploited vector (Exchange, RDP, etc.) before re-connecting.
3. File Decryption & Recovery
- Recovery Feasibility: There is no publicly available decryptor. DOXES uses ECDH over secp256k1 to generate a per-host AES-256 key that is then encrypted with the attackers’ public key. Keys are exfiltrated; without the gang’s private key or an intact offline key-cache, decryption is currently impossible.
- Essential Tools/Patches:
- Kaspersky’s RakhniDecryptor and Emsisoft Decryptor do not cover DOXES yet—track NoMoreRansom.org listings.
- 2023-11 ESXi cumulative patch (build-13.3) & November/B Dec 2023 updates for Windows/Exchange (they disable older TLS ciphers leveraged by DOXES loaders).
- ESXi File Integrity Monitoring: VMware vSphere 8 File Integrity subsystem with attestation token to detect rogue ELF binaries.
4. Other Critical Information
- Unique Characteristics:
- DOXES deliberately skips virtual machine configuration files (
*.vmx,*.vmdk.descriptor) so that victims can still power machines on after encryption. This is not altruism—it forces organizations to remain online and reveals the impact visibly, increasing ransom payment pressure. - When it finishes encryption, DOXES drops
HOW-TO_DECRYPT_FILES.txtin every folder ingested. The ransom note is unusual because it actually threatens to publicly dump the stolen vmdk snapshots on deep-web forums (double-extortion), but the deadline shrinks from 72 h to 24 h if the victim contacts them through an open channel (instead of TOX), pointing to operational insecurity. - Broader Impact:
- MSPs and cloud hosters running multi-tenant ESXi environments have borne the heaviest losses—one incident at a mid-sized German hoster encrypted >820 VMs across 11 nodes in under 6 minutes.
- Because DOXES couples a Linux (ESXi) and Windows payload, hybrid on-prem/Data-Center infrastructures face near-simultaneous encryption of both guest data and hypervisor storage, inflating both operational downtime and ransoms.
Immediate actions for anyone discovering .DOXES files
- Do not reboot affected ESXi servers—some variants overwrite key memory pages where encryption keys could be recovered. Freeze the host, take memory images (vol.py or WinPmem/FTK Imager) for potential forensic extraction.
- Preserve a full backup of the encrypted dataset before any recovery attempts—sometimes a key is published months later.
- Report the IOCs (file hashes, ransom wallet, IP/port 192.168.x.x:33492) to your national CERT or the FBI Internet-Crime Complaint Center to feed cross-victim correlation.
Stay vigilant and layer your defenses: ESXi security hardening, authentication hygiene, endpoint control, and immutable backups are the best answers to DOXES today.