Trigona Rebranding Suspicions and Global Threats, and BlackNevas Ransomware Analysis
The BlackNevas ransomware group, first appearing in November 2024, has been targeting various industries and critical infrastructure globally, with a focus on the Asia-Pacific region. The group uses AES and RSA encryption, adding the '.-encrypted' extension to affected files. BlackNevas operates independently, threatening to leak data on their own site and through partners. The ransomware supports multiple arguments, excludes certain system paths and file types from encryption, and uses a unique method to check for previous infection. It also creates ransom notes in all accessible folders, demanding negotiation within seven days to prevent data leaks.
AI Analysis
Technical Summary
The BlackNevas ransomware group emerged in November 2024 and has since targeted a variety of industries and critical infrastructure worldwide, with a particular focus on the Asia-Pacific region. This ransomware employs strong cryptographic methods, specifically AES (Advanced Encryption Standard) and RSA (Rivest–Shamir–Adleman) encryption algorithms, to encrypt victim files. Encrypted files are appended with a distinctive '.-encrypted' extension, signaling compromise. BlackNevas operates autonomously, without known affiliations, and threatens victims with data leaks both on their own leak site and through partner leak sites if ransom negotiations fail. The ransomware supports multiple command-line arguments, allowing some operational flexibility, and deliberately excludes certain system paths and file types from encryption, likely to maintain system stability or evade detection. It uses a unique mechanism to detect prior infections on a system to avoid redundant encryption. Additionally, BlackNevas creates ransom notes in every accessible folder, demanding victims initiate negotiations within seven days to prevent data leaks. The tactics and techniques employed align with several MITRE ATT&CK techniques, including T1489 (Service Stop), T1082 (System Information Discovery), T1055 (Process Injection), T1112 (Modify Registry), T1059 (Command and Scripting Interpreter), T1083 (File and Directory Discovery), T1027 (Obfuscated Files or Information), T1486 (Data Encrypted for Impact), T1012 (Query Registry), T1070.004 (File Deletion), T1564.001 (Hidden Files and Directories), and T1490 (Inhibit System Recovery). Indicators of compromise include multiple file hashes associated with the ransomware binaries. Although primarily focused on Asia-Pacific, BlackNevas has been observed affecting European countries such as Italy and Lithuania. No known exploits in the wild or CVEs are associated with this ransomware yet, and it is rated with a medium severity by the source.
Potential Impact
For European organizations, the BlackNevas ransomware presents a significant threat to confidentiality, integrity, and availability of data. The encryption of files using AES and RSA renders critical data inaccessible, potentially halting business operations, especially in sectors reliant on timely data access such as healthcare, manufacturing, and critical infrastructure. The threat of data leakage adds a reputational risk and potential regulatory consequences under GDPR, as leaked sensitive or personal data could lead to fines and legal actions. The seven-day negotiation window pressures organizations to respond quickly, which may lead to rushed decisions or payment of ransom. The ransomware’s exclusion of certain system paths may allow partial system functionality, but the overall impact remains disruptive. The unique infection check mechanism complicates remediation efforts, as reinfection attempts may be avoided but initial infection cleanup requires thoroughness. European organizations with interconnected networks or supply chains linked to Asia-Pacific may face increased exposure. The lack of known exploits in the wild suggests that infection vectors may rely on phishing, compromised credentials, or other initial access methods, emphasizing the need for strong perimeter defenses and user awareness. The medium severity rating reflects the ransomware’s strong encryption and data leak threats balanced against the absence of widespread exploitation in Europe so far.
Mitigation Recommendations
1. Implement robust endpoint detection and response (EDR) solutions capable of detecting behaviors associated with BlackNevas, such as process injection (T1055), registry modifications (T1112), and file encryption activities (T1486). 2. Enforce strict network segmentation to limit lateral movement and contain infections. 3. Maintain regular, offline, and immutable backups of critical data to enable recovery without paying ransom; ensure backup systems are isolated from production networks. 4. Conduct targeted threat hunting for indicators of compromise, including the provided file hashes, and monitor for the '.-encrypted' file extension. 5. Harden systems by disabling unnecessary services and restricting administrative privileges to reduce attack surface. 6. Deploy multi-factor authentication (MFA) to prevent credential compromise. 7. Educate employees on phishing and social engineering tactics to reduce initial infection risk. 8. Monitor and restrict use of scripting environments and command interpreters to detect suspicious activity. 9. Implement application allowlisting to prevent execution of unauthorized binaries. 10. Prepare and test incident response plans that include rapid isolation of infected systems and communication protocols for ransom negotiation and regulatory reporting. 11. Regularly update and patch systems to close vulnerabilities that could be exploited for initial access, even though no specific CVEs are linked to BlackNevas. 12. Collaborate with threat intelligence sharing communities to stay updated on BlackNevas developments and emerging indicators.
Affected Countries
Italy, Lithuania, Germany, France, United Kingdom, Netherlands
Indicators of Compromise
- hash: 2374998cffb71f3714da2075461a884b
- hash: 4a1864a95643b0211fa7ad81b676fe2e
- hash: 9f877949b8cbbb3adfe07fd4411b9f26
- hash: f2547a80dd64dcd5cba164fe4558c2b6
- hash: d5486a14ef0cd5f9aae9d4fb3321a7b72cbb28ef
- hash: ae5cec8b64404037d86f12d1261e669819c84675c74fe09a57cda5099109d8e2
Trigona Rebranding Suspicions and Global Threats, and BlackNevas Ransomware Analysis
Description
The BlackNevas ransomware group, first appearing in November 2024, has been targeting various industries and critical infrastructure globally, with a focus on the Asia-Pacific region. The group uses AES and RSA encryption, adding the '.-encrypted' extension to affected files. BlackNevas operates independently, threatening to leak data on their own site and through partners. The ransomware supports multiple arguments, excludes certain system paths and file types from encryption, and uses a unique method to check for previous infection. It also creates ransom notes in all accessible folders, demanding negotiation within seven days to prevent data leaks.
AI-Powered Analysis
Technical Analysis
The BlackNevas ransomware group emerged in November 2024 and has since targeted a variety of industries and critical infrastructure worldwide, with a particular focus on the Asia-Pacific region. This ransomware employs strong cryptographic methods, specifically AES (Advanced Encryption Standard) and RSA (Rivest–Shamir–Adleman) encryption algorithms, to encrypt victim files. Encrypted files are appended with a distinctive '.-encrypted' extension, signaling compromise. BlackNevas operates autonomously, without known affiliations, and threatens victims with data leaks both on their own leak site and through partner leak sites if ransom negotiations fail. The ransomware supports multiple command-line arguments, allowing some operational flexibility, and deliberately excludes certain system paths and file types from encryption, likely to maintain system stability or evade detection. It uses a unique mechanism to detect prior infections on a system to avoid redundant encryption. Additionally, BlackNevas creates ransom notes in every accessible folder, demanding victims initiate negotiations within seven days to prevent data leaks. The tactics and techniques employed align with several MITRE ATT&CK techniques, including T1489 (Service Stop), T1082 (System Information Discovery), T1055 (Process Injection), T1112 (Modify Registry), T1059 (Command and Scripting Interpreter), T1083 (File and Directory Discovery), T1027 (Obfuscated Files or Information), T1486 (Data Encrypted for Impact), T1012 (Query Registry), T1070.004 (File Deletion), T1564.001 (Hidden Files and Directories), and T1490 (Inhibit System Recovery). Indicators of compromise include multiple file hashes associated with the ransomware binaries. Although primarily focused on Asia-Pacific, BlackNevas has been observed affecting European countries such as Italy and Lithuania. No known exploits in the wild or CVEs are associated with this ransomware yet, and it is rated with a medium severity by the source.
Potential Impact
For European organizations, the BlackNevas ransomware presents a significant threat to confidentiality, integrity, and availability of data. The encryption of files using AES and RSA renders critical data inaccessible, potentially halting business operations, especially in sectors reliant on timely data access such as healthcare, manufacturing, and critical infrastructure. The threat of data leakage adds a reputational risk and potential regulatory consequences under GDPR, as leaked sensitive or personal data could lead to fines and legal actions. The seven-day negotiation window pressures organizations to respond quickly, which may lead to rushed decisions or payment of ransom. The ransomware’s exclusion of certain system paths may allow partial system functionality, but the overall impact remains disruptive. The unique infection check mechanism complicates remediation efforts, as reinfection attempts may be avoided but initial infection cleanup requires thoroughness. European organizations with interconnected networks or supply chains linked to Asia-Pacific may face increased exposure. The lack of known exploits in the wild suggests that infection vectors may rely on phishing, compromised credentials, or other initial access methods, emphasizing the need for strong perimeter defenses and user awareness. The medium severity rating reflects the ransomware’s strong encryption and data leak threats balanced against the absence of widespread exploitation in Europe so far.
Mitigation Recommendations
1. Implement robust endpoint detection and response (EDR) solutions capable of detecting behaviors associated with BlackNevas, such as process injection (T1055), registry modifications (T1112), and file encryption activities (T1486). 2. Enforce strict network segmentation to limit lateral movement and contain infections. 3. Maintain regular, offline, and immutable backups of critical data to enable recovery without paying ransom; ensure backup systems are isolated from production networks. 4. Conduct targeted threat hunting for indicators of compromise, including the provided file hashes, and monitor for the '.-encrypted' file extension. 5. Harden systems by disabling unnecessary services and restricting administrative privileges to reduce attack surface. 6. Deploy multi-factor authentication (MFA) to prevent credential compromise. 7. Educate employees on phishing and social engineering tactics to reduce initial infection risk. 8. Monitor and restrict use of scripting environments and command interpreters to detect suspicious activity. 9. Implement application allowlisting to prevent execution of unauthorized binaries. 10. Prepare and test incident response plans that include rapid isolation of infected systems and communication protocols for ransom negotiation and regulatory reporting. 11. Regularly update and patch systems to close vulnerabilities that could be exploited for initial access, even though no specific CVEs are linked to BlackNevas. 12. Collaborate with threat intelligence sharing communities to stay updated on BlackNevas developments and emerging indicators.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://asec.ahnlab.com/en/90080/"]
- Adversary
- BlackNevas
- Pulse Id
- 68c3ce9443e13ce31423a13c
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash2374998cffb71f3714da2075461a884b | — | |
hash4a1864a95643b0211fa7ad81b676fe2e | — | |
hash9f877949b8cbbb3adfe07fd4411b9f26 | — | |
hashf2547a80dd64dcd5cba164fe4558c2b6 | — | |
hashd5486a14ef0cd5f9aae9d4fb3321a7b72cbb28ef | — | |
hashae5cec8b64404037d86f12d1261e669819c84675c74fe09a57cda5099109d8e2 | — |
Threat ID: 68c3d5ba78082adedc8e7683
Added to database: 9/12/2025, 8:11:38 AM
Last enriched: 9/12/2025, 8:12:16 AM
Last updated: 9/12/2025, 8:12:16 AM
Views: 2
Related Threats
Apple issues spyware warnings as CERT-FR confirms attacks
MediumBeaches and breaches
MediumInside the 2025 Energy Phishing Wave: Chevron, Conoco, PBF, Phillips 66
MediumCyberVolk Ransomware: Analysis of Double Encryption Structure and Disguised Decryption Logic
MediumAI-Generated Code and Fake Apps Used for Far-Reaching Attacks
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.