Skip to main content

Trigona Rebranding Suspicions and Global Threats, and BlackNevas Ransomware Analysis

Medium
Published: Fri Sep 12 2025 (09/12/2025, 07:41:08 UTC)
Source: AlienVault OTX General

Description

The BlackNevas ransomware group, first appearing in November 2024, has been targeting various industries and critical infrastructure globally, with a focus on the Asia-Pacific region. The group uses AES and RSA encryption, adding the '.-encrypted' extension to affected files. BlackNevas operates independently, threatening to leak data on their own site and through partners. The ransomware supports multiple arguments, excludes certain system paths and file types from encryption, and uses a unique method to check for previous infection. It also creates ransom notes in all accessible folders, demanding negotiation within seven days to prevent data leaks.

AI-Powered Analysis

AILast updated: 09/12/2025, 08:12:16 UTC

Technical Analysis

The BlackNevas ransomware group emerged in November 2024 and has since targeted a variety of industries and critical infrastructure worldwide, with a particular focus on the Asia-Pacific region. This ransomware employs strong cryptographic methods, specifically AES (Advanced Encryption Standard) and RSA (Rivest–Shamir–Adleman) encryption algorithms, to encrypt victim files. Encrypted files are appended with a distinctive '.-encrypted' extension, signaling compromise. BlackNevas operates autonomously, without known affiliations, and threatens victims with data leaks both on their own leak site and through partner leak sites if ransom negotiations fail. The ransomware supports multiple command-line arguments, allowing some operational flexibility, and deliberately excludes certain system paths and file types from encryption, likely to maintain system stability or evade detection. It uses a unique mechanism to detect prior infections on a system to avoid redundant encryption. Additionally, BlackNevas creates ransom notes in every accessible folder, demanding victims initiate negotiations within seven days to prevent data leaks. The tactics and techniques employed align with several MITRE ATT&CK techniques, including T1489 (Service Stop), T1082 (System Information Discovery), T1055 (Process Injection), T1112 (Modify Registry), T1059 (Command and Scripting Interpreter), T1083 (File and Directory Discovery), T1027 (Obfuscated Files or Information), T1486 (Data Encrypted for Impact), T1012 (Query Registry), T1070.004 (File Deletion), T1564.001 (Hidden Files and Directories), and T1490 (Inhibit System Recovery). Indicators of compromise include multiple file hashes associated with the ransomware binaries. Although primarily focused on Asia-Pacific, BlackNevas has been observed affecting European countries such as Italy and Lithuania. No known exploits in the wild or CVEs are associated with this ransomware yet, and it is rated with a medium severity by the source.

Potential Impact

For European organizations, the BlackNevas ransomware presents a significant threat to confidentiality, integrity, and availability of data. The encryption of files using AES and RSA renders critical data inaccessible, potentially halting business operations, especially in sectors reliant on timely data access such as healthcare, manufacturing, and critical infrastructure. The threat of data leakage adds a reputational risk and potential regulatory consequences under GDPR, as leaked sensitive or personal data could lead to fines and legal actions. The seven-day negotiation window pressures organizations to respond quickly, which may lead to rushed decisions or payment of ransom. The ransomware’s exclusion of certain system paths may allow partial system functionality, but the overall impact remains disruptive. The unique infection check mechanism complicates remediation efforts, as reinfection attempts may be avoided but initial infection cleanup requires thoroughness. European organizations with interconnected networks or supply chains linked to Asia-Pacific may face increased exposure. The lack of known exploits in the wild suggests that infection vectors may rely on phishing, compromised credentials, or other initial access methods, emphasizing the need for strong perimeter defenses and user awareness. The medium severity rating reflects the ransomware’s strong encryption and data leak threats balanced against the absence of widespread exploitation in Europe so far.

Mitigation Recommendations

1. Implement robust endpoint detection and response (EDR) solutions capable of detecting behaviors associated with BlackNevas, such as process injection (T1055), registry modifications (T1112), and file encryption activities (T1486). 2. Enforce strict network segmentation to limit lateral movement and contain infections. 3. Maintain regular, offline, and immutable backups of critical data to enable recovery without paying ransom; ensure backup systems are isolated from production networks. 4. Conduct targeted threat hunting for indicators of compromise, including the provided file hashes, and monitor for the '.-encrypted' file extension. 5. Harden systems by disabling unnecessary services and restricting administrative privileges to reduce attack surface. 6. Deploy multi-factor authentication (MFA) to prevent credential compromise. 7. Educate employees on phishing and social engineering tactics to reduce initial infection risk. 8. Monitor and restrict use of scripting environments and command interpreters to detect suspicious activity. 9. Implement application allowlisting to prevent execution of unauthorized binaries. 10. Prepare and test incident response plans that include rapid isolation of infected systems and communication protocols for ransom negotiation and regulatory reporting. 11. Regularly update and patch systems to close vulnerabilities that could be exploited for initial access, even though no specific CVEs are linked to BlackNevas. 12. Collaborate with threat intelligence sharing communities to stay updated on BlackNevas developments and emerging indicators.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://asec.ahnlab.com/en/90080/"]
Adversary
BlackNevas
Pulse Id
68c3ce9443e13ce31423a13c
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash2374998cffb71f3714da2075461a884b
hash4a1864a95643b0211fa7ad81b676fe2e
hash9f877949b8cbbb3adfe07fd4411b9f26
hashf2547a80dd64dcd5cba164fe4558c2b6
hashd5486a14ef0cd5f9aae9d4fb3321a7b72cbb28ef
hashae5cec8b64404037d86f12d1261e669819c84675c74fe09a57cda5099109d8e2

Threat ID: 68c3d5ba78082adedc8e7683

Added to database: 9/12/2025, 8:11:38 AM

Last enriched: 9/12/2025, 8:12:16 AM

Last updated: 9/12/2025, 8:12:16 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats