Trigona Ransomware Now Uses a Custom Data Exfiltration Tool – Veri Sızıntısı

Trigona ransomware boosts data theft with new custom tool

The Trigona ransomware group is now using a custom command-line tool to steal data from its victims more quickly and efficiently. This new tactic enhances the effectiveness of the attackers' double extortion model.

Trigona ransomware boosts data theft with new custom tool

Summary of the Incident

Cybersecurity researchers have identified an update in the attack tactics of the Trigona ransomware group. In recently observed attacks, the group was found to be using a custom-designed command-line tool to steal data from compromised systems. This new tool allows the attackers to significantly speed up and streamline the data exfiltration process. This development is a significant topic in cybersecurity and current Data Breach News.

Data Theft Method and Threats

Trigona's new tool is used to stealthily extract valuable data before the ransomware encrypts the files. This method is part of the tactic known as "double extortion." The attackers not only demand a ransom for decrypting files but also increase pressure on the victim by threatening to publish the stolen data. The use of a custom-developed tool can make it harder to detect by standard security software, providing attackers with greater stealth.

Protection Methods for Organizations

To protect against advanced threats like Trigona, it is crucial for organizations to take proactive cybersecurity measures. These measures can include:

Has your email been leaked? Check for free — results in seconds.

Check Now →
  • Network Segmentation: Restricting lateral movement of attackers by isolating networks with critical data.
  • Strong Backup Strategy: Regularly backing up data offline and securely.
  • Security Awareness Training: Educating employees against social engineering attacks like phishing.
  • Advanced Threat Detection: Using advanced security solutions to monitor network traffic and anomalous activities.

Furthermore, using a Data Breach Search service to check if your information has been exposed in past leaks can help you assess potential risks.

Kaynak

https://www.bleepingcomputer.com/news/security/trigona-ransomware-attacks-use-custom-exfiltration-tool-to-steal-data/

Weekly Newsletter

Curated data breach news delivered to your inbox every week.