Trigona Rebranding Suspicions and Global Threats, and BlackNevas Ransomware Analysis
NetmanageIT OpenCTI - opencti.netmanageit.com

SUMMARY :
The BlackNevas ransomware group, first appearing in November 2024, has been targeting various industries and critical infrastructure globally, with a focus on the Asia-Pacific region. The group uses AES and RSA encryption, adding the '.-encrypted' extension to affected files. BlackNevas operates independently, threatening to leak data on their own site and through partners. The ransomware supports multiple arguments, excludes certain system paths and file types from encryption, and uses a unique method to check for previous infection. It also creates ransom notes in all accessible folders, demanding negotiation within seven days to prevent data leaks.
OPENCTI LABELS :
ransomware,encryption,data leak,global threats,rsa,asia-pacific,aes,blacknevas
AI COMMENTARY :
1. In the ever-shifting landscape of cybercrime, recent developments have drawn attention to two pivotal concerns: the suspected rebranding of the Trigona operation and the emergence of the BlackNevas ransomware group. Threat intel analysts have noted that these actors are adapting their tactics and infrastructure to evade detection, signaling an escalation in global threats that demand immediate attention.
2. Trigona’s rebranding has raised suspicions among intelligence communities worldwide. Once associated with a narrow set of targeted campaigns, the actor now appears under a new banner with upgraded tooling and an expanded victim profile. This evolution suggests a deliberate effort to shed past indicators of compromise and complicate attribution. As a result, organizations must remain vigilant for anomalies linked to legacy Trigona signatures even as new monikers appear in dark-web chatter.
3. The BlackNevas ransomware group surfaced in November 2024 and has rapidly gained notoriety for its focus on critical infrastructure and commercial sectors within the Asia-Pacific region. Leveraging both technical prowess and social engineering methods, BlackNevas has demonstrated an ability to infiltrate enterprise networks, exfiltrate sensitive data, and deploy encryption tools at scale. Their global reach underscores the importance of region-agnostic threat monitoring and collaboration among cybersecurity teams across time zones.
4. BlackNevas employs a dual encryption scheme that combines AES and RSA, appending the extension .-encrypted to compromised files. The group’s payload supports numerous command-line arguments, enabling operators to fine-tune which directories and file types to exclude from encryption. A distinctive infection check prevents reinfection on the same host, while routine scans identify any overlooked data stores. Upon successful encryption, the malware populates every accessible folder with a ransom note, creating a uniform footprint across the victim environment.
5. Beyond the technical intrusion, BlackNevas intensifies pressure through threats of a data leak. Victims are warned that if negotiations do not conclude within seven days, stolen information will be published on the group’s proprietary leak site or distributed via affiliated partners. This tactic leverages the fear of reputational damage and regulatory fines, effectively forcing organizations into expedited ransom discussions to mitigate potential data leak fallout.
6. Defending against these evolving tactics requires a multi-layered strategy. Organizations should maintain up-to-date backups in offline repositories, enforce strict access controls, and deploy endpoint detection solutions capable of flagging suspicious encryption activity. Network segmentation can isolate critical systems from general user environments, reducing lateral movement risk. Regular threat intelligence sharing and proactive vulnerability assessments will help identify rebranding attempts like those attributed to Trigona and preempt newly emerging strains such as BlackNevas.
7. As ransomware and encryption-based extortion continue to transform, threat intel teams must stay ahead of actors who rebrand and refine their methods. Continuous collaboration between global security communities, combined with real-time monitoring of data leak sites and encrypted payload characteristics, will be essential to countering both legacy operations and innovative groups. By embracing threat intelligence insights, organizations can fortify their defenses against the next wave of global threats.
OPEN NETMANAGEIT OPENCTI REPORT LINK!
Use public read only username and password on login page.
NOTE : Use Public READ only user credentials on login page banner.
Trigona Rebranding Suspicions and Global Threats, and BlackNevas Ransomware Analysis