Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Analysis of Trigona Threat Actor's Latest Attack Cases

0
Medium
Published: Wed Oct 29 2025 (10/29/2025, 10:50:37 UTC)
Source: AlienVault OTX General

Description

The Trigona threat actor targets MS-SQL servers primarily through brute-force and dictionary attacks exploiting weak credentials. They deploy additional payloads using CLR Shell and leverage tools such as BCP, Curl, Bitsadmin, and PowerShell to install malware. Remote control tools like AnyDesk, RDP, and possibly Teramind are used to maintain persistence and control. A newly observed Rust-based scanner malware targets RDP and MS-SQL services to identify vulnerable hosts. The actor employs various privilege escalation and file manipulation techniques, along with custom tools like SpeedTest and StressTester. The threat actor's activity poses risks of unauthorized access, data compromise, and potential ransomware deployment. Defenders should enforce complex passwords, restrict database server access via firewalls, and maintain up-to-date security software. No known public exploits exist yet, but the threat remains active and evolving.

AI-Powered Analysis

AILast updated: 10/29/2025, 11:21:40 UTC

Technical Analysis

The Trigona threat actor continues to conduct targeted attacks against Microsoft SQL (MS-SQL) servers by exploiting weak or default credentials through brute-force and dictionary attack methods. Once access is gained, the attackers utilize the Common Language Runtime (CLR) Shell to execute additional malicious payloads within the database environment, allowing them to bypass some traditional security controls. They employ legitimate system tools such as Bulk Copy Program (BCP), Curl, Bitsadmin, and PowerShell to download and install malware, which aids in evading detection by blending with normal administrative activities. For remote control and lateral movement, Trigona uses remote desktop tools including AnyDesk, Remote Desktop Protocol (RDP), and possibly Teramind, enabling persistent access and control over compromised systems. A notable development is the introduction of a scanner malware written in Rust, designed to identify vulnerable RDP and MS-SQL services, indicating an automated reconnaissance capability to expand their attack surface. The threat actor also uses custom tools like SpeedTest and StressTester, likely for network performance measurement and denial-of-service capabilities, respectively. Privilege escalation and file manipulation techniques are employed to deepen system compromise and maintain persistence. Although no known public exploits are reported, the combination of credential attacks, use of legitimate tools, and custom malware indicates a sophisticated and evolving threat. The attack chain highlights the importance of securing database credentials, monitoring for unusual use of administrative tools, and controlling remote access to critical infrastructure.

Potential Impact

European organizations running MS-SQL servers with weak or default credentials are at significant risk of unauthorized access, data theft, and potential ransomware infection due to Trigona's activities. Compromise of database servers can lead to exposure of sensitive business and customer data, disruption of critical services, and financial losses. The use of legitimate administrative tools for malware deployment complicates detection, increasing dwell time and potential damage. The Rust-based scanner malware increases the likelihood of widespread scanning and targeting of vulnerable systems across Europe. Organizations with remote access enabled via RDP or AnyDesk are particularly vulnerable to lateral movement and persistent control by attackers. The threat actor's ability to escalate privileges and manipulate files further exacerbates the risk of system takeover and data integrity loss. Given the medium severity, the impact is substantial but can be mitigated with proper controls. The threat also poses reputational risks and potential regulatory compliance issues under GDPR if personal data is compromised.

Mitigation Recommendations

1. Enforce strong, complex passwords and implement account lockout policies to prevent brute-force and dictionary attacks on MS-SQL servers. 2. Disable or restrict remote access protocols such as RDP and AnyDesk to only trusted IP addresses using firewall rules and VPNs. 3. Monitor and restrict the use of administrative tools like BCP, Curl, Bitsadmin, and PowerShell, employing application whitelisting and behavior-based detection to identify anomalous usage. 4. Regularly update and patch MS-SQL servers and associated software to reduce attack surface, even though no specific exploits are known. 5. Implement network segmentation to isolate database servers from general user networks and limit lateral movement opportunities. 6. Deploy endpoint detection and response (EDR) solutions capable of detecting CLR Shell usage and unusual privilege escalation activities. 7. Conduct regular security audits and penetration testing focused on credential strength and remote access configurations. 8. Utilize multi-factor authentication (MFA) for administrative and remote access accounts. 9. Analyze network traffic for signs of scanning activity, especially from Rust-based scanner malware, and block suspicious IPs. 10. Maintain comprehensive logging and alerting for authentication failures and unusual file or process activities on database servers.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://asec.ahnlab.com/en/90793/"]
Adversary
Trigona
Pulse Id
6901f17d5de87bf1b10b2e99
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash2e4d250ecae8635fa3698eba5772a3b9
hash3c21181c35d955f9e557417998c38942
hash44bca3e7da4c28be4f55af0370091931
hash4af4c15092110057cb0a97df626c4ef4
hash4d627c63fdd8442eaf7d9be7e50d1e46
hash60b30e194972f937b859d0075be69e2a
hash91b82d74d58a52d73a1b1fa1898462bb69f9622b
hashc941ebe1bef2dba55aa74b9d2ac4bdab94182223
hashfab4c587e52cf2ddeb1ac999dca45a24b6a49098
hash0cc363668c85f3ab916795839b94c328f612cefa820ce9ee7da18b9ac19389fe
hashcdfbd285104f3b1f2d79f01643df734920129c7e4af6ed7e0cd7b845558ee218
hashf9322aa6b0527098520f9a041c4f4b2be81e95e2739310baaab1926f4ef40d80

Ip

ValueDescriptionCopy
ip179.43.159.186
ip198.55.98.133

Threat ID: 6901f6978cf71dc7fdc08496

Added to database: 10/29/2025, 11:12:23 AM

Last enriched: 10/29/2025, 11:21:40 AM

Last updated: 10/30/2025, 3:47:56 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats