Site icon TheCyberThrone

Trigona Ransomware Disection

Advertisements

Researchers have discovered a new ransomware family that has been highly active over the past several months.

The threat actor known to be Trigona, targets organizations in agriculture, construction, finance, high tech, manufacturing, and marketing in Australia, Italy, France, Germany, New Zealand, and the United States.

Trigona stands out peculiar from other file-encrypting ransomware out there is the use of a .hta ransomware note that contains JavaScript code to display payment instructions to the victim that contains unique victim identifiers, a link to a Tor portal to negotiate with the attackers, and an email address.

Advertisements

Trigona ransomware uses a Delphi AES library to encrypt files and appends the ‘_locked’ extension to them. The malware achieves persistence for itself and the dropped ransom note by modifying registry keys.

Trigona’s operators have been observed compromising a target’s network, performing reconnaissance, employing remote monitoring and management (RMM) software to download malware, creating new user accounts, and executing the ransomware.

Some of the tools observed in Trigona attacks

The ransomware operators also use a leak site to list the victims. This leak site resembles BlackCat ransomware, which suggests that Trigona might be leveraging BlackCat’s reputation to extort victims.

Researchers identified similarities with the TTPs associated with CryLock ransomware, which suggests that CryLock’s operators might have moved on to the new ransomware family.

Advertisements

Trigona is a newer strain of ransomware that, to date, has had minimal coverage by security news articles. This lack of security community awareness allows Trigona to discreetly attack victims while other higher-profile ransomware operations dominate the news headlines.

This research is documented by researchers from Palo Alto Unit42 and Fortinet.

Indicators of Compromise

Exit mobile version