top of page

Trigona Ransomware Gang Deploys Custom Exfiltration Tool for Data Theft and Detection Evasion

  • 3 days ago
  • 2 min read

Key Findings


  • Trigona ransomware operators have deployed a custom command-line tool called uploader_client.exe to replace publicly available utilities like Rclone and MegaSync

  • The shift, observed in March 2026 attacks, provides attackers greater control and detection evasion capabilities

  • The custom tool uses multiple parallel connections and rotates TCP connections to avoid network monitoring and traffic analysis

  • Trigona affiliates disable security tools using vulnerable kernel drivers before deploying the exfiltration tool

  • This represents a significant tactical evolution showing increased investment in proprietary malware development


Background


Trigona has operated as a Ransomware-as-a-Service since late 2022 and is linked to the Rhantus cybercrime group. Like most RaaS operations, Trigona relies on affiliate networks to conduct attacks. Symantec researchers documented the shift to custom tooling following incidents in March 2026, marking a notable departure from the group's previous reliance on commercial off-the-shelf utilities.


Custom Exfiltration Tool Capabilities


The uploader_client.exe tool operates by connecting to attacker-controlled servers and handles data theft with sophisticated efficiency measures. It defaults to five parallel connections per file to maximize bandwidth utilization. After transmitting 2,048 MB of data, the tool rotates its TCP connection to a different IP address, a technique designed to bypass security monitoring systems that flag extended high-volume connections to single endpoints.


The tool also intelligently filters out large files with minimal value and prioritizes sensitive data like documents and PDFs. In observed cases, attackers targeted invoices and high-value documents stored on network drives. Access to stolen data is secured through authentication keys, limiting exposure if the command and control infrastructure is compromised.


Attack Methodology


Before deploying the custom uploader, Trigona operators systematically disable endpoint security. They use utilities including HRSword, PCHunter, and GMER, often exploiting vulnerable kernel drivers to terminate protective software. PowerRun executes these tools with elevated privileges to bypass administrative restrictions.


Initial access typically comes through remote administration tools like AnyDesk. Once inside systems, attackers harvest credentials using Mimikatz and Nirsoft password recovery utilities to access stored passwords across applications and browsers, expanding their lateral movement capabilities.


Strategic Implications


The investment in custom tooling reflects a calculated tradeoff for Trigona operators. Developing proprietary tools requires significant resources and development time, yet provides stealth advantages that generic utilities cannot match. Publicly available tools have become so well-known that security solutions routinely flag them, making custom development increasingly attractive despite the overhead. This signals growing sophistication within the ransomware ecosystem as operators seek competitive advantages in an increasingly monitored threat landscape.


Sources


  • https://securityaffairs.com/191294/cyber-crime/trigona-ransomware-adopts-custom-tool-to-steal-data-and-evade-detection.html

  • https://www.facebook.com/SCMag/posts/trigona-ransomware-ups-its-game-with-custom-exfiltration-tool-boosting-stealth-a/1591451199648830/

  • https://gbhackers.com/custom-data-theft-tool/amp/

  • https://teamwin.in/ransomware-hackers-develop-custom-exfiltration-tool-to-steal-sensitive-data/

Recent Posts

See All

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page