<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[(security.com) Trigona Ransomware Affiliates Deploy Custom Data Exfiltration Tool with Advanced Evasion Capabilities]]></title><description><![CDATA[<p>(security.com) Trigona Ransomware Affiliates Deploy Custom Data Exfiltration Tool with Advanced Evasion Capabilities</p><p>Trigona ransomware affiliates (Rhantus) now deploy *uploader_client.exe*—a custom exfiltration tool with advanced evasion capabilities, replacing off-the-shelf utilities like Rclone. This shift signals heightened operational maturity in pre-ransomware tradecraft.</p><p>In brief - Trigona RaaS operators have adopted a bespoke data exfiltration tool, enabling granular control over stolen data, parallel transfers, and connection rotation to evade detection. Attackers disable defenses via BYOVD, harvest credentials with Mimikatz/Nirsoft, and establish persistence via AnyDesk before exfiltrating high-value files.</p><p>Technically - *uploader_client.exe* communicates with C2 163.172.105.82:1080, using 5 parallel TCP streams per file, rotating connections after 2,048 MB. Pre-exfiltration activity includes kernel-level defense evasion via HRSword, PCHunter, and other BYOVD tools (e.g., Gmer, YDark), credential theft via Mimikatz and Nirsoft utilities, and elevated execution via PowerRun. File filtering prioritizes high-value extensions (e.g., PDFs, invoices).</p><p>Source: <a href="https://www.security.com/threat-intelligence/trigona-exfiltration-custom" rel="nofollow noopener"><span>https://www.</span><span>security.com/threat-intelligen</span><span>ce/trigona-exfiltration-custom</span></a></p><p><a href="https://swecyb.com/tags/Cybersecurity" rel="tag">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/ThreatIntel" rel="tag">#<span>ThreatIntel</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/7d8c8bcb-d570-4f1e-a7aa-f720ce6157c9/security.com-trigona-ransomware-affiliates-deploy-custom-data-exfiltration-tool-with-advanced-evasion-capabilities</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 06:17:41 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/7d8c8bcb-d570-4f1e-a7aa-f720ce6157c9.rss" rel="self" type="application/rss+xml"/><pubDate>Thu, 23 Apr 2026 11:03:34 GMT</pubDate><ttl>60</ttl></channel></rss>