Trigona Ransomware Adopts Custom Tool to Steal Data and Evade Detection

Share
Minimalist white line art on a navy background showing a file folder icon with multiple outgoing parallel arrows and a lock, symbolizing high-speed, secure data exfiltration.

The Trigona ransomware-as-a-service (RaaS) group, linked to the Rhantus cybercrime umbrella, has begun using a privately-built exfiltration tool instead of common utilities like Rclone and MegaSync. The new “uploader_client.exe” client helps Trigona move data quickly, rotate connections to hide from network monitoring, and maintain a lower profile during the high-stakes theft phase.

Incident Analysis — In the world of double-extortion ransomware, the moment of data theft is the most sensitive part of the operation. If a defender catches the exfiltration, they can kill the attack before the final encryption payload ever drops.

To lower this risk, the Trigona ransomware group has officially moved away from commodity software. Recent investigations by Symantec and other researchers reveal that Trigona affiliates are now deploying a custom-built utility, often identified as uploader_client.exe. This shift signals a major evolution in RaaS operations: top-tier groups are no longer just developers of "lockers"; they are becoming sophisticated providers of specialized data-theft infrastructure.


The Anatomy of a Custom "Uploader"

Trigona Custom Tooling Specs
Feature Capability
Evasion Strategy Rotates TCP connections every 2GB of data to bypass behavioral detection.
Throughput Utilizes 5 parallel connections per file to saturate victim bandwidth.
Filtering Logic Excludes low-value media; prioritizes high-value docs (PDF, XLSX, DOCX).
Pre-Exfil Step Automated disabling of EDR/AV via kernel driver abuse (HRSword).

Previously, ransomware groups relied on off-the-shelf tools like Rclone, MegaSync, or FileZilla. While effective, these tools are now heavily flagged by Endpoint Detection and Response (EDR) and Security Information and Event Management (SIEM) rules. Trigona’s new custom tool is designed specifically to bypass these modern tripwires.

Key Technical Capabilities:

  • Parallel Connectivity: The tool supports five parallel connections per file. By saturating available bandwidth, Trigona can exfiltrate massive datasets significantly faster than standard cloud-sync utilities.
  • Connection Rotation: To evade network-behavioral analytics that look for long-lived, high-volume sessions to a single IP, the tool automatically rotates TCP connections after every 2GB of traffic.
  • Selective Filtering: Unlike "dump everything" scripts, this tool can filter files by extension. Attackers can prioritize high-value targets like PDFs, .docx, and .xlsx (invoices, legal docs, and financial records) while ignoring large, low-value media files.
  • Access Control: The tool requires a hardcoded authentication key, ensuring that only authorized Trigona operators can access the C2 server where the stolen data is staged.

The "Environment Prep" Phase: Kernel Driver Abuse

Trigona’s use of custom exfiltration tools is preceded by a brutal "environment preparation" phase. Before the theft begins, attackers have been observed disabling endpoint protection suites using kernel-driver-abuse paths. By deploying utilities like the Huorong HRSword driver, PCHunter, or Gmer, the attackers effectively blind the EDR before the custom uploader ever touches the disk.

This combination of kernel-driver-abuse and custom tooling creates a "stealth window" that allows affiliates to operate with relative impunity during the most critical hours of the breach.


The CyberSignal Analysis: Strategic Signals

Signal 01 — The Industrialization of Exfiltration

Data theft is no longer a side-job for ransomware actors; it is a core module of the RaaS platform. By providing affiliates with proprietary tools like uploader_client.exe, Trigona is ensuring that its "brand" of extortion is faster and more reliable than groups using noisy, public tools.

Signal 02 — Behavioral Defense is the New Baseline

As attackers move toward custom, signature-less tooling, "blocking known apps" is becoming an obsolete strategy. Defenders must shift their focus to detecting anomalous network behaviors — such as the 2GB connection-rotation pattern — and monitoring for unauthorized kernel driver installations.

Signal 03 — The Evolution of Double-Extortion

Selective filtering shows that Trigona is refining the "double-extortion" model. They are becoming more surgical — stealing only what is necessary to ruin a victim's reputation or legal standing, while using the encryption phase to maximize operational chaos.


Sources

Type Source
Technical BleepingComputer: Trigona Custom Exfil Tool
Intelligence SecurityAffairs: Custom Evasion Analysis
News CybersecurityNews: RaaS Tooling Evolution
Forensics DataBreaches.net: Affiliate Activity Report
Research Trend Micro: Trigona RaaS Spotlight

Read more