CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Trigona ransomware affiliates adopt custom exfiltration tool for efficient data theft

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

Trigona ransomware affiliates are deploying a custom-built command-line exfiltration tool named "uploader_client.exe" to streamline data theft from compromised environments. The tool facilitates parallel uploads, connection rotation post-2GB traffic to evade monitoring, selective file type exfiltration, and access restriction via authentication keys. Observed in March 2026 attacks, the utility supports faster and stealthier data exfiltration compared to public tools like Rclone or MegaSync, reducing detection risks during critical phases of intrusions. The campaign leverages the Trigona ransomware, a double-extortion operation active since October 2022, targeting high-value documents such as invoices and PDFs on network drives. Recent activity suggests resumption of operations following disruptions to the group’s infrastructure in October 2023.

Timeline

  1. 23.04.2026 21:59 1 articles · 2h ago

    Trigona ransomware affiliates deploy custom exfiltration tool "uploader_client.exe" in March 2026 intrusions

    Symantec observed Trigona ransomware affiliates using a proprietary command-line tool named "uploader_client.exe" for data exfiltration in March 2026 attacks. The tool supports parallel uploads, connection rotation after 2GB of traffic, selective file type exfiltration, and authentication-based access control to restrict unauthorized access to stolen data. The campaign follows prior disruptions to the Trigona operation in October 2023 and involves additional post-compromise activities, including the deployment of the Huorong HRSword kernel driver, termination of endpoint protection processes via vulnerable drivers, and credential theft using Mimikatz and Nirsoft utilities.

    Show sources

Information Snippets