Numerous manufacturing, finance, agriculture, construction, marketing, and technology firms in the U.S., France, Germany, Italy, Australia, and New Zealand have been targeted by the Trigona ransomware operation since its emergence in October, with 15 or more organizations potentially impacted by the operation in December alone, SecurityWeek reports.
File encryption is being facilitated by Trigona ransomware through the use of a Delphi AES library, with persistence established on its own while altering registry keys to enable the deployment of a .hta ransomware note, according to a report from Palo Alto Networks' Unit 42 team.
Several tools are also being used in Trigona attacks, including NetScan, Mimikatz, and Advanced Port Scanner. Moreover, the Trigona operation was also discovered to share CryLock ransomware's tactics, techniques, and procedures.
"Trigona is a newer strain of ransomware that, to date, has had minimal coverage by security news articles. This lack of security community awareness allows Trigona to discreetly attack victims while other higher-profile ransomware operations dominate the news headlines," said Unit 42.
Ransomware, Threat Management
Global attacks launched by Trigona ransomware
An In-Depth Guide to Ransomware
Get essential knowledge and practical strategies to protect your organization from ransomware attacks.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds