
A gaggle of cyber activists underneath the Ukrainian Cyber Alliance banner has hacked the servers of the Trigona ransomware gang and wiped them clear after copying all the knowledge accessible.
The Ukrainian Cyber Alliance fighters say they exfiltrated the entire knowledge from the risk actor’s methods, together with supply code and database information, which can embrace decryption keys.
Trigona ransomware out of fee
Ukrainian Cyber Alliance hackers gained entry to Trigona ransomware’s infrastructure by utilizing a public exploit for CVE-2023-22515, a important vulnerability in Confluence Knowledge Middle and Server that may be leveraged remotely to escalate privileges.
The vulnerability was leveraged in assaults as a zero-day since September 14 by no less than one risk group that Microsoft tracks as Storm-0062 (also called DarkShadow and Oro0lxy).
The Ukrainian Cyber Alliance, or UCA for brief, first breached Trigona ransomware’s Confluence server about six days in the past, established persistence, and mapped the cybercriminal’s infrastructure utterly unnoticed.
After a UCA activist utilizing the deal with herm1t printed screenshots of the ransomware gang’s inner help paperwork, BleepingComputer was instructed that Trigona ransomware initially panicked and responded by altering the password and taking down its public-facing infrastructure.
Nevertheless, over the following week, the activists managed to take all the knowledge from the risk actor’s administration and sufferer panels, their weblog and knowledge leak website, and inner instruments (Rocket.Chat, Jira, and Confluence servers).
herm1t instructed BleepingComputer that additionally they exfiltrated the developer surroundings, cryptocurrency sizzling wallets in addition to the supply code and database information.
The activists don’t know if the knowledge they transferred accommodates any decryption keys however they stated they’d launch them if discovered.
After harvesting all accessible knowledge from the ransomware gang, the UCA activists deleted and defaced their websites, additionally sharing the important thing for the administration panel website.

supply: herm1t
UCA claims that they had been capable of retrieve three backups with a whole lot of gigabytes of doubtless stolen paperwork.

supply: herm1t
The Ukrainian Cyber Alliance
Beginning in 2014, a number of hacktivists in Ukraine and around the globe began working collectively to defend the nation’s our on-line world in opposition to Russian aggression.
About two years later, particular person hackers and several other hacker teams united to type the Ukrainian Cyber Alliance, now registered as a non-governmental group, and commenced to focus on varied organizations and people supporting Russia’s exercise in opposition to Ukraine.
The identities of the members of the group are secret, apart from those who set it up as an official entity whose work is ruled by the civic responsibility for the nation.
Based on the group’s Wikipedia web page, its members carried out a number of profitable hacking operations that resulted in exposing details about Russian exercise and propaganda efforts in Ukraine and different nations, in addition to its management over varied people and entities.
Amongst UCA’s claims are hacking the Russian Ministry of Protection twice in 2016 and leaking public protection contracts and confidential knowledge on the supply of the state protection order of 2015–2016.
One other success was hacking the emails of Vladislav Surkov, a person believed to have designed the equipment for the Russian propaganda of the previous years, the place he mentioned the annexation of Crimea and fund the Luhansk and Donetsk territories once they grew to become Russian republics.
Trigona ransomware exercise
The Trigona ransomware operation emerged underneath this identify in late October final yr, when the gang launched a Tor website to barter ransom funds in Monero cryptocurrency with victims of their assaults.
Beforehand, samples of the malware had no particular identify and had been noticed within the wild for the reason that starting of 2022. Earlier than the Trigona branding, the operators used e mail to barter the ransom funds.
For some time, the cybercriminals had been sufficiently lively to compromise in a single month no less than 15 corporations within the manufacturing, finance, building, agriculture, advertising, and excessive know-how sectors.
Earlier this yr, Trigona hackers had been concentrating on Microsoft SQL servers uncovered on the general public web utilizing brute-force or dictionary assaults to acquire entry credentials.
In the meanwhile, as a result of Ukrainian Cyber Alliance’s current actions, not one of the Trigona ransomware public web sites and companies are on-line.