‘Trigona’ is a strain of ransomware that was first reported in October 2022. The threat actor(s) deploying this ransomware performs double extortion attacks, there have been multiple research reports noting that the threat actors achieved initial access via a combination of brute force attacks, purchasing credentials from initial access brokers (“IABs”), and exploitation of vulnerable public-facing applications. By April 2023, Trigona began targeting compromised MSSQL servers by stealing credentials via brute force methods. In May 2023, a Linux version of Trigona that shared similarities with its Windows counterpart. And there is a high-profile incident happened in Hong Kong recently.
Actions Preventing ‘Trigona’ Attack
Firewall
Enable your firewalls as well as intrusion detection and prevention systems.
Ensure latest signature has been applied on IPS.
Proactively monitor and validate the incoming and outgoing traffic of the network for any unauthorized attempts to the systems.
Ensure the system has up-to-date operating systems (OS) and software updates.
Ensure up-to-date anti-virus signatures from your anti-virus software such as Kaspersky or Windows Defender updated and perform scanning regularly.
Backup critical and important files regularly and keep them in offline or separate location, and test the backup restoration process to verify reliability.
Implement network segmentation to isolate critical systems and limit lateral movement within the network.
Beware of phishing emails and DO NOT open email/attachments from unknown/untrusted source.
Ensure all accounts with strong and different password and enable 2FA.
Review the user accounts regularly.
Disable unused ports and services.
Disable command-line and scripting activities and permissions if possible.
Note: these are good security defense-in-depth recommendations for prevention of being infected, but these steps alone do not guarantee against infection.
As a Victim:
Disconnect the system from the network IMMEDIATELY.
DO NOT respond to any kidnapper by attempting payment and instead to report the incident to your departmental IT Support, ITSC and the Police.
The Trigona threat actors achieved initial access via a combination of brute force attacks, purchasing credentials from initial access brokers (“IABs”), and exploitation of vulnerable public-facing applications.
The threat actors would subsequently look to persist through various means.
There are various open source and commonly used tools being leveraged by threat actors to perform their malicious activities. These include:
Advanced Port Scanner and SoftPerfect Network Scanner for network reconnaissance.
ScreenConnect, AnyDesk, SplashTop, and various other legitimate remote desktop applications for lateral movement.
Use of Mimikatz to gather passwords and credentials on the machines of the victims for lateral movement.
Cobalt Strike beacon deployed through PowerShell that was then used by the threat actor to run the ransomware executable.
Deployment of files that terminate anti-virus related services and processes, such as turnoff.bat.
Perform data exfiltration and use a data wiper feature to hinder forensic analysis or destroy victims’ data.
This website uses Cookies, including Cookies from Google Analytics, to ensure you get the best browsing experience. If you “Continue” to use this site, you consent to the use of Cookies. Read more about Cookies
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
Cookie
Duration
Description
cookielawinfo-checkbox-analytics
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional
11 months
The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy
11 months
The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.