Trigona Ransomware

Experiencing Ransomware or Cyber Breach?

Response time is everything when you're under attack. If you've been breached or have an urgent matter, contact us immediately.
Trigona emerged in 2022 and has remained highly active since. The group shares similarities with CryLock, suggesting links to the Russian cyber threat group.

You'll be able to identify an Trigona ransomware infiltration by the notification that appears on your systems, signalling that they have become inaccessible, and your data encrypted. Specialised threat actors will then demand payment, usually in cryptocurrency for discreet transactions. Failure to comply may result in threats to either delete or leak your data.

Why you must not interfere with your ransomware environment

If you arrived at your offices to find someone had broken in, your initial response would be to call the police and refrain from touching anything, understanding that this could contaminate the crime scene.

A cyber-attack demands the same approach. You must leave the environment untouched as a forensic investigation, conducted by Digital forensic specialists will need to take place. This is not a job for your IT team or MSP.

Trigona ScreenA PC Monitor
If you find a note on your system showing information like the above, you've likely fallen victim to a Trigona Ransomware attack.
YOU MUST NOT ATTEMPT TO TOUCH, RESTORE OR OVERWRITE THE DATA

Who is Trigona? What does it do?

The ransomware variant known as Trigona was first observed in June 2022. It is thought that the threat actors behind Trigona are the same group behind the CryLock ransomware due to similarities in tools, tactics, and procedures (TTPs). However, the group has also been linked to ALPHV/Blackcat, although this claim has not been verified.

Apart from a focus on large organisations, Trigona is indiscriminate in terms of the industries and geographical locations they target. Financial institutions, education, manufacturing, medical and legal industries have all been targeted by Trigona. The US and India topped the list for the highest number of Trigona ransomware attacks, while Israel, Turkey, Brazil, and Italy also reported a significant number of incidents.

Trigona operates a public data leak site and is categorised as a multi-extortion group that uses payloads coded in Delphi, showcasing the group's emphasis on evasion and fast encryption. The main method of deployment is through spear phishing and exploitation of known vulnerabilities.

UK Data 2024

How does Trigona Attack?

Using double extortion to encrypt a victim's data, the group renders it inaccessible, and then exfiltrates sensitive information, such as personal or company data. The threat actors demand payment for decrypting the files and preventing the release of the data on the dark web.

This dual threat significantly intensifies pressure on victims to pay the ransom, even if they have backups, due to the potential data exposure, which can result in reputational damage and legal consequences. This tactic has gained popularity among cybercriminals as it increases their chances of receiving payment.

How old is Trigona and how many attacks have there been?

The Trigona ransomware group is relatively new, with initial observations occurring in June 2022. The group maintains a relatively low profile when compared to more widespread families.

To date they have claimed ownership of 49 successful attacks but may have attempted a far higher number.

Most Recent Trigona Attacks
TitleAvailableLast visitfqdnScreenshots
BlogNo2025-01-11 19:17:29.382940http://krsbhaxbki6jr4zvwblvkaqzjkircj7cxf46qt3na5o5sj2hpikbupqd.onion
Trigona is GoneNo2023-10-18 06:57:12.690779http://trigonax2zb3fw34rbaap4cqep76zofxs53zakrdgcxzq6xzt24l5lqd.onion
BlogNo2023-06-26 10:51:25.916035http://6n5tfadusp4sarzuxntz34q4ohspiaya2mc6aw6uhlusfqfsdomavyyd.onion

Solace Cyber’s track record includes hundreds of successful response recoveries, providing Digital Forensic Incident Response services, 24x7x365.

"97 percent of organisations have seen an increase in cyber threats since the start of the Russia-Ukraine war in 2022."

Read more...

Post Breach Actions

Your NCSC-approved supplier is a specialist Crime Scene Investigator who helps you get back to full operation faster. They will:
  • Isolate and preserve your environment for forensic investigation.
  • Identify where the data has been duplicated and issue a legal takedown order.
  • Identify your data, application and systems restore points. These might be at different points in time and will need to be carefully restored and reconstructed in a pristine environment.
  • Liase with your business insurance company and if needed, with the Police.
  • Advise you on notifying your customers of your situation.
  • Rebuild your systems, restore your data and get you back to full operation.
Note: This process can take between 2 weeks – 2 months.

Ransom Groups Stats by Industry

Critical infrastructure ransomware attacks 2021 bar chartCIR Assured Service Provider Logo

Who is Solace Cyber and what experience do they have in recovering from Trigona ransomware attacks?

Solace Global was founded in 2010 as global experts in risk management and security, offering services such as Travel, Crisis, and Offshore Risk Management. With a 24/7 Security Operations Centre and an in-house intelligence team providing daily and weekly reports, Solace Global is accredited to ISO 27001, 14001, 45001, and 9001 standards.

Solace Cyber was established in 2021, specialising in Cyber breaches, particularly Digital Forensics and Incident Response, Ransomware, Risk Management, and Information Security, along with Managed Security Services. The leadership team collectively possess over 20 years of experience in the IT and security industry.

Solace Cyber is accredited to ISO 27001 and in 2022 gained the prestigious Cyber Incident Response (Level 2) accreditation with the National Cyber Security Centre in 2022. This accreditation represents the UK’s highest cyber security standards, providing top-tier incident response support and recovery.

Solace Cyber Stats

s

Successful breach recoveries

Users recovered in largest ransomware case
We have NEVER paid a ransom
Designed automation tools to reduce costs

%+

Incident Response
delivered via our Insurance
Partners

Experiencing Ransomware or Cyber Breach?

Response time is everything when you're under attack. If you've been breached or have an urgent matter, contact us immediately.

Why should I trust Solace Cyber to do this work rather than my IT team?

A forensic analysis needs to be meticulous. A clean restore and recovery requires a wealth of experience not normally available in an in-house team who must provide a broader range of IT support skills:

  • Internal IT teams don’t have the necessary skill set to resolve security encryption issues themselves.
  • Internal teams are pressured to restore business operations and may recover before forensic analysis even begins, potentially destroying the crime scene before completion.
  • IT teams may recover to the same position with indicators of compromise ready to do it again…. which can lead to another breach.
  • In 2022, there were not enough adequately qualified people in the job market to meet the CSIRT* resource requirements.
  • Cybercrime has stepped up again in 2024.
IT Support for a Business
cyber security

Solace Cyber was established precisely for this scenario. We have a well-defined process for handling cyber-attacks like Trigona, which involves a 6-step approach:

  1. Triage
  2. Analysis
  3. Contain and Mitigate
  4. Remediate and Eradicate
  5. Recover
  6. Post-Incident Examination

It includes a thorough digital forensic analysis from step 2 where the output becomes a central component of business recovery. This is because understanding the attack is of critical importance:

  • It provides an initial infection date
  • It clarifies the extent and spread of infection
  • It provides insight into the impact data exfiltration has on regulatory positions
  • It ensures the attacker and any tooling or artefacts they leave behind are eradicated

It is critical that the analysis of digital evidence is carried out to an agreed plan. This will have been designed to provide the best and earliest chance of discovering a root cause, which is essential to inform remediation/eradication and recovery as well as supporting a legal take-down case if this is applicable. A legal take-down means we can assist in the legal enforcement that stops the criminals from publishing the data, thus undermining the ransom notice.

Solace Cyber’s Digital Forensic and Incident Response teams maintain consistent communication throughout. Dedicated Incident Managers and technical engineering leads provide updates during the Cyber Incident Response journey, utilising risk registers and working within change management processes, all from triage through to post-incident delivering successful business recovery.

Key Take Aways

  • You won't be able to access your systems or data.
  • It's recommended to disconnect from the internet and shut down your systems to prevent further infections, including PCs.
  • Your Office 365 system might also be compromised, allowing them to monitor your responses. Avoid communicating with individuals through your main email or team systems.
  • Threat actors would have infiltrated your system at least 2-4 weeks before you noticed. Your data would have already been stolen. If your system is encrypted, this didn't happen last night.
  • Ransom costs can vary from £0.5m to £3m.
  • Paying the ransom could violate financial sanctions, which is a criminal offence and could result in imprisonment or further financial penalties.
  • Data sold or published on the web puts your customers and staff at risk, implicating you in a data protection breach.
  • You will need to initiate a data takedown request from the initial location where the data was sent.
  • Do not overwrite the encrypted data. It is crucial to determine when the infection began and where the data was sent.
  • Do not rebuild from the latest backup as it may have been infected.
How do I maintain security in future to prevent a further ransomware attack?

Solace Cybers’ support continues beyond the recovery process. Once your business is back up and running, we work with you to transform your cyber security through a threat-informed approach utilising our Solace Global - Cyber 9 Step Process.

Frequently asked questions

Yes. Trigona is a form of ransomware that encrypts data on victim machines using the Advanced Encryption Standard (AES) algorithm.

The Trigona ransomware entered your system by:

  • Exploiting vulnerabilities
  • Leveraging valid accounts
  • Scoping network weaknesses

We recommend you adopt policies to:

  1. Educate your staff on the importance of cyber security and the risks of not complying
  2. Use strong passwords
  3. Multi-factor authentication
  4. Remove old users
  5. Perform regular backups
  6. Deploy timely updates to software and systems

After recovering from a Trigona ransom attack, Solace Cyber recommends that you update your business continuity plan to account for lessons learnt during this attack & recovery.

Most ransomware breaches cost approx. £500K with smaller email data breaches in the realm of £50K. There is a dichotomy of preserving the environment for forensics or recovering it quickly for less business interruption. The cost increases the longer it takes to identify the breach and resolve it.

A Cyber Security insurance claim is complex and includes reasonable expenses to investigate and remediate an incident along with cover for legal, business interruption, criminal liability, employment liability and ransom policies. The insurance industry is liable to deliver the business recovery BUT Cyber insurance is viewed as volatile within the industry and many insurance policies are not being validated correctly.

Navigating through this requires expertise, which is where Solace Cyber can help.

Law enforcement discourages paying ransom demands. If you do choose to pay, there's no guarantee you will regain access to your data or prevent it from being shared on the dark web. In a new trend, ransomware affiliates are actively monetising stolen data outside of their original RaaS agreements.

The NCSC have documented the deliberations for paying ransomware: https://www.ncsc.gov.uk/ransomware/home

Important Reminder: It is a criminal offense to pay money to people who are subject to financial sanctions. The list of who is subject to financial sanctions is constantly changing.

The latest iteration can be found here: https://www.gov.uk/government/publications/financial-sanctions-consolidated-list-of-targets

Most likely, yes. Some of the lost data might be classified as "Personal Data" for your customers which you are legally obligated to protect. As a ransom attack means this data may have been lost, you hold a legal and moral duty to inform your customers. You also need to inform the Information Commissioner's Office (ICO) at https://ico.org.uk/.

Thankfully your insurer or legal counsel will be able to guide you on what steps to take and how to proceed. Alternatively, Solace has expertise in collaborating with insurers and lawyers and can aid in handling this relationship during this challenging period.

A ransomware attack poses the biggest threat to your business by:

  • Disabling your access to systems which may prevent you from operating machinery or from following steps through your business process.
  • Preventing you from accessing your data which may relate to suppliers and shipments, customers and their orders or steps in your business process.

In the event of a business interruption, identifying your position in the supply chain for any specific item can be challenging. Continuing and sustaining operations may also become difficult. If the interruption is prolonged, operational output will be affected. Even after systems and data are restored, reconciling the work done during the downtime will be challenging and require careful planning for future tasks.

This is why Ransomware is second only to receivership for debilitating a business.

The NCSC is the UK National Cyber Security Centre. They provide cyber security guidance and support, helping to make the UK the safest place to live and work online. They have defined a Cyber Incident Response procedure and they have approved and accredited suppliers to provide this service.

https://www.ncsc.gov.uk/

As a recognised Assured Service Provider by the National Cyber Security Centre (NCSC), Solace Cyber provide comprehensive cyber risk management services that are designed to Protect, Detect & Mitigate cyber security threats across the UK.

Action Fraud is the UK's national reporting centre for fraud and cybercrime. Whether you have been scammed, defrauded, or experienced cybercrime in England, Wales, or Northern Ireland, Action Fraud offers a central point of contact for information on fraud and financially motivated cybercrime.

https://www.actionfraud.police.uk/

Contact Us

Under Attack?

If your systems are showing signs of a Trigona attack, REMAIN CALM.

YOU MUST NOT TOUCH THEM, RESTORE OR OVERWRITE THE DATA (explanation above).

Contact Solace Cyber on 01202 308818 or complete our form for a call back from one of our experts.

We will act promptly to reduce your business downtime.

Request a callback

Solace Cyber, part of Solace Global, helps companies across the UK recover from ransomware attacks and data breaches.

Risk
Offshore
Cyber
Intelligence & Reports
Case Studies

SOLACE GLOBAL CYBER LTD is registered in England & Wales no. 08830710

Solace Global

Twin Sails House,
W Quay Rd,
Poole, BH15 1JF
United Kingdom

Telephone

Please note that calls may be recorded for security and training purposes.