A pro-Ukraine hacktivist group, the Ukrainian Cyber Alliance, has claimed responsibility for disabling the Trigona ransomware group’s leak site. Led by their spokesperson known as “herm1t,” the alliance managed to take down ten of Trigona’s servers, deface their website, and exfiltrate data related to the cybercrime operation. This aggressive move disrupted the entire infrastructure of Trigona, including the website’s administrative panel, landing page, blog, internal server, cryptocurrency wallets, and developer servers.
Furthermore, Trigona Leaks, a dark web “name-and-shame” extortion blog allegedly operated by the Trigona ransomware group, had been actively targeting victims in the U.S. and Europe, advertising stolen data. Dmitry Smilyanets, a product management director at Recorded Future, emphasized the real threat they posed. Herm1t revealed that the Ukrainian Cyber Alliance plans to scrutinize the obtained data and may consider sharing it with other researchers in the future.
Additionally, in a related development, herm1t claimed to have hacked the Trigona group’s account for the Confluence collaboration platform, highlighting how even ransomware gangs are exploiting such platforms for their activities.
Trigona ransomware, first observed in June 2022, primarily targeted tech, healthcare, and banking companies across several countries. Known for its tough deadlines, the group attempted to extort victims by imposing intimidating time requirements and then directed them to a dark web payment portal that accepted Monero cryptocurrency.
Researchers have suggested a potential connection between the threat actor behind Trigona and the Russia-linked AlphV group, also known as BlackCat, although these similarities are considered circumstantial, and it is unclear whether ALPHV was directly involved in Trigona’s development and operation.