The Trigona ransomware was first detected in October 2022 and uses a double-extortion method, where it encrypts valuable files and systems within a company and demands payment in exchange for not releasing sensitive information. The hackers behind Trigona offer to decrypt up to three files as evidence that they have the means to restore the data.
Trigona Ransomware Signatures
Family: Trojan:Win32/Woreflint.A!cl
MD5: 67dd0708a2dcbe6b7661fd5eb4593ea7
SHA256: 704f1655ce9127d7aab6d82660b48a127b5f00cadd7282acb03c440f21dae5e2
Trigona Ransomware Download