Trigona ransomware adopts custom tool to steal data and evade detection
Trigona ransomware now uses a custom command-line tool to steal data faster and evade detection, replacing tools like Rclone and MegaSync. Symantec researchers report that recent Trigona ransomware attacks used a custom-built data exfiltration tool instead of common utilities like Rclone or MegaSync
ORIGINAL SOURCE →via Security Affairs
ADVERTISEMENT
⚡ STAY AHEAD
Events like this, convergence-verified across 689 sources, land in your inbox every Sunday. Free.
GET THE SUNDAY BRIEFING →RELATED · cyber
- [CYBER] Discovery of a novel vulnerability in aggressive lymphoma could change future therapy
- [CYBER] SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 94
- [CYBER] Why Diff Tools Lie: Detecting Hidden File Changes with PowerShell Hash Verification
- [CYBER] I made a free website for cybersecurity awareness training
- [CYBER] DevSecOps in Practice: Tools That Actually Catch Vulnerabilities - Part 5 - Container Scanning with Trivy
- [CYBER] UK In Touch With US Ahead Of King Charles' Visit Amid Trump Security Breach