Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Spring security advisory (AV26-386) – Canadian Centre for Cyber Security

    April 24, 2026

    Researchers Simulated a Delusional User to Test Chatbot Safety

    April 24, 2026

    Tenable security advisory (AV26-387) – Canadian Centre for Cyber Security

    April 24, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»Trigona ransomware attacks use custom exfiltration tool to steal data
    News

    Trigona ransomware attacks use custom exfiltration tool to steal data

    adminBy adminApril 23, 2026No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Trigona ransomware attacks use custom exfiltration tool to steal data

    Recently observed Trigona ransomware attacks are using a custom, command-line tool to steal data from compromised environments faster and more efficiently.

    The utility was emplayed in attacks in March that were attributed to a gang affiliate, likely in an effort to avoid publicly available tools, such as Rclone and MegaSync, that typically trigger security solutions.

    Researchers at cybersecurity company Symantec believe that the shift to a custom tool may indicate that the attacker is “investing time and effort in proprietary malware in a bid to maintain a lower profile during a critical phase of their attacks.”

    image

    In a report today, the researchers say that the tool is named “uploader_client.exe” and connects to a hardcoded server address. Its performance and evasion capabilities include:

    • Support for five simultaneous connections per file for faster data exfiltration via parallel uploads.
    • Rotation of TCP connections after 2GB of traffic to evade monitoring.
    • Option for selective file type exfiltration, excluding large, low-value media files.
    • Use of an authentication key to restrict access to stolen data by outsiders.

    In one incident, the exfiltration tool was used to steal high-value documents such as invoices and PDFs on network drives.

    Trigona ransomware was launched in October 2022 as a double-extortion operation that demanded its victims to pay ransoms in the Monero cryptocurrency.

    Although Ukrainian cyber activists disrupted the Trigona operation in October 2023, hacking its servers and stealing internal data such as source code and database records, Symantec’s report suggests that the threat actors resumed operations.

    According to Symantec’s observations of recent Trigona attacks, threat actor installs the Huorong Network Security Suite tool HRSword as a kernel driver service.

    This phase is followed by deploying additional tools that can disable security-related products (e.g., PCHunter, Gmer, YDark, WKTools, DumpGuard, and StpProcessMonitorByovd).

    “Many of these leveraged vulnerable kernel drivers to terminate endpoint protection processes,” Symantec says.

    Some of the utilities were executed with PowerRun, a product that can launch apps, executables, and scripts with elevated privileges, thus bypassing user-mode protections.

    AnyDesk was used for direct remote access on the breached systems, while Mimikatz and Nirsoft utilities were executed for credential theft and password recovery operations.

    Symantec has listed indicators of compromise (IoCs) associated with the latest Trigona activity at the bottom of its report to help with the timely detection and blocking of these attacks.


    article image

    AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

    At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls hold, and closes the remediation loop.

    Claim Your Spot



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleSSA-682326 V1.0: Multiple Vulnerabilities in COMOS before V10.4.5
    Next Article ZDI-26-296: Delta Electronics ASDA-Soft PAR File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability
    admin
    • Website

    Related Posts

    News

    Researchers Simulated a Delusional User to Test Chatbot Safety

    April 24, 2026
    News

    International cyber agencies share fresh advice to defend against China-linked covert networks

    April 23, 2026
    News

    Community Votes to Deny Water to Nuclear Weapons Data Center

    April 23, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Catchy & Intriguing

    March 17, 202660 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Catchy & Intriguing

    March 17, 202660 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Our Picks

    Spring security advisory (AV26-386) – Canadian Centre for Cyber Security

    April 24, 2026

    Researchers Simulated a Delusional User to Test Chatbot Safety

    April 24, 2026

    Tenable security advisory (AV26-387) – Canadian Centre for Cyber Security

    April 24, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.