A new strain of ransomware, dubbed Trigona, has been identified to be highly active over the past several months. The strain was named after a family of stingless bees and was first discovered in October 2022. Trigona was reportedly highly active in December 2022, and security experts are scrambling to learn more about this new strain.
Unit 42 researchers identified that Trigona affected manufacturing, finance, construction, marketing, and high-technology organizations. According to the researchers, “Trigona’s threat operator engages in behaviours such as obtaining initial access to a target’s environment, conducting reconnaissance, transferring malware via remote monitoring and management (RMM) software, creating new user accounts, and deploying ransomware.”
The researchers also noted that the operators had reached a global scale, already being identified in countries like Australia, Italy, France, Germany, New Zealand, and the US. According to experts, “one of the main features that set Trigona apart from other file-encrypting ransomware out there is the use of a .hta ransomware note that contains JavaScript code to display payment instructions to the victim.”
Furthermore, JavaScript contains the victim’s unique identifier. It also includes a link to a Tor portal for negotiation between the victim and attacker and an email address. Leading cybersecurity company Palo Alto Networks reported that at least 15 companies might have been compromised in December 2022. The company also stated that it had found several other ransom notes between January and February 2023.
Unit 42 added that “Some of the tools observed in Trigona attacks include NetScan (for reconnaissance), Start.bat batch script (copies files to a newly created folder), Turnoff.bat (a cleanup script), Newuser.bat (creates a new user account), Mimikatz, DC4.exe (executes a batch file to disable UAC, opens specific firewall ports, and enables remote desktop connections), and Advanced Port Scanner.”
The ransomware operators also utilise leak sites to shame their victims, coercing them to pay the ransom demanded. Posts on the leak site typically have a brief description of the company, and type of data hacked, and a bid button for anyone to purchase it.
More Stories
Killnet and AnonymousSudan Collaborate to Launch Cyber Attacks on Western Organisations
In recent news, it has been reported that two Russia-sympathetic hacktivist groups, Killnet and AnonymousSudan, have allegedly launched a series...
$4000 Gone In An Instant: Mother Defrauded in Facebook Marketplace Car Deal
A mother of four is warning others to be cautious after believing she had purchased a safe and dependable car...
Shocking Scam: Sydney Family Loses $200K Life-Savings in Suncorp Spoofing Fraud
A family from Sydney has lost their life savings worth $200,000 due to a fraudulent scam. Peter and Madison, who...
Mysterious Money Transfer Leaves Couple Speechless: How They Got an Unsolicited $4000
A young couple in Melbourne claims their bank is making up a personal loan they do not understand. Ashley and...
Phishing + AI + Voice Cloning= Big Trouble: The New Way Criminals are Stealing Your Money
New Alert: Criminals use AI and voice cloning to trick you out of your money. Earlier this year, Microsoft unveiled...
‘Impossible to Spot’ Delivery Scam Email Targets Australia Post Customers – Don’t Fall Victim!
Unsuspecting shoppers should be cautious as a parcel delivery scam that is hard to distinguish targets Australia Post customers. Email...