Frequently Asked Questions

Trigona Ransomware Virus—Threat Details & Response

What is the Trigona (._locked) ransomware virus?

Trigona is a ransomware variant that encrypts files on infected systems, appending the ._locked extension. It demands ransom payments in Monero cryptocurrency via a Tor negotiation site and threatens to leak or sell data if the ransom is not paid. Victims are provided with a ransom note named how_to_decrypt.hta in each affected folder, which includes instructions and a link to the Tor site.

How does Trigona ransomware infect computers?

Trigona ransomware is typically distributed through infected email attachments (macros), torrent websites, malicious ads, and downloads from unofficial or deceptive pages. It can be delivered via malicious JavaScript files, Microsoft Office or PDF documents, executables, ISO files, and archive files such as ZIP or RAR.

What are the symptoms of a Trigona ransomware infection?

Symptoms include being unable to open files, files having a new ._locked extension, and the appearance of a ransom note (how_to_decrypt.hta) on the desktop and in affected folders. Victims are also presented with a demand to pay a ransom in Monero to regain access to their files.

What file extension does Trigona ransomware add to encrypted files?

Trigona ransomware appends the ._locked extension to all encrypted files, making them inaccessible without the decryption key.

What ransom note does Trigona ransomware leave?

The ransomware creates a ransom note named how_to_decrypt.hta in each scanned folder. This note provides information about the attack, a link to the Tor negotiation site, and an authorization key for logging in to the site.

Is there a free decryptor available for Trigona ransomware?

No, as of the latest information, there is no free decryptor available for Trigona ransomware. Victims are urged to avoid paying the ransom and to consult cybersecurity professionals for guidance.

What payment method do Trigona attackers demand?

Trigona attackers demand ransom payments in Monero cryptocurrency, with instructions provided via a Tor website.

Can victims decrypt any files for free?

Yes, the ransom note claims that victims can have three files decrypted for free before paying, as a demonstration that decryption is possible.

What command line arguments does Trigona support?

Trigona supports several command line arguments, including /full, /!autorun, /test_cid, /test_vid, /path, /!local, /!lan, and /autorun_only. These control aspects such as whether local or network files are encrypted and if autorun keys are added.

What are the main distribution methods for Trigona ransomware?

Trigona is mainly distributed through infected email attachments, torrent websites, malicious ads, and downloads from unofficial or deceptive sources.

What types of files can be used to deliver Trigona ransomware?

Trigona can be delivered via malicious JavaScript files, Microsoft Office or PDF documents, executables, ISO files, and archive files such as ZIP or RAR.

What is the potential damage caused by Trigona ransomware?

Trigona encrypts all files, making them inaccessible without payment. It may also install additional password-stealing trojans and other malware, increasing the risk of further compromise.

How does the ransom price change over time?

The ransom note warns that the price for decryption increases every hour, urging victims to contact the attackers as soon as possible to avoid higher costs.

What detection names do antivirus vendors use for Trigona ransomware?

Detection names include Avast (Win32:RansomX-gen [Ransom]), Combo Cleaner (Gen:Variant.Fragtor.168126), ESET-NOD32 (A Variant Of Win32/Filecoder.OLC), Kaspersky (HEUR:Trojan-Ransom.Win32.Generic), and Microsoft (Trojan:Win32/Wacatac.B!ml). For a full list, see VirusTotal.

How can organizations validate their defenses against ransomware like Trigona?

Organizations can use Cymulate's Threat Validation solution to simulate ransomware attacks and validate their security controls against the latest threats. This helps identify gaps and optimize defenses proactively. Learn more about Cymulate Threat Validation.

What resources does Cymulate offer for ransomware protection in healthcare?

Cymulate provides a blog post explaining why proactive cybersecurity strategies are essential for healthcare organizations to defend against ransomware. Read the blog post.

How does Cymulate's Threat Validation differ from manual pen tests?

Cymulate's Threat Validation provides automated, continuous security testing with a library of over 100,000 attack actions, daily threat intelligence, and out-of-the-box integrations. This approach is faster and more comprehensive than infrequent manual penetration tests. Learn more.

What is Cymulate's Exposure Management Platform?

The Cymulate Exposure Management Platform is a unified solution that combines Breach and Attack Simulation (BAS), Continuous Automated Red Teaming (CART), and Exposure Analytics. It enables organizations to continuously validate, prioritize, and remediate exposures across their environments. Learn more.

What are the key features of Cymulate's platform for ransomware defense?

Key features include continuous threat validation, automated attack simulations, AI-powered remediation prioritization, attack path discovery, automated mitigation, and an extensive threat library updated daily. These capabilities help organizations stay ahead of ransomware and other advanced threats. See all features.

How does Cymulate help prioritize and remediate exposures?

Cymulate validates the exploitability of exposures and ranks them based on prevention and detection capabilities, business context, and threat intelligence. This enables organizations to focus on the most critical vulnerabilities and automate remediation where possible. Learn more.

What is Cymulate's pricing model?

Cymulate uses a subscription-based pricing model tailored to each organization's needs. Pricing depends on the chosen package, number of assets, and scenarios selected. For a custom quote, schedule a demo.

How quickly can Cymulate be implemented?

Cymulate is designed for rapid, agentless deployment. Customers can start running simulations almost immediately, with minimal setup and no need for additional hardware or complex configurations. Book a demo to see how quickly you can get started.

What integrations does Cymulate support?

Cymulate integrates with a wide range of security technologies, including Akamai Guardicore, AWS GuardDuty, BlackBerry Cylance OPTICS, Carbon Black EDR, Check Point CloudGuard, Cisco Secure Endpoint, CrowdStrike Falcon, Wiz, SentinelOne, and more. See the full list.

What security certifications does Cymulate hold?

Cymulate holds SOC2 Type II, ISO 27001:2013, ISO 27701, ISO 27017, and CSA STAR Level 1 certifications, demonstrating compliance with industry-leading security and privacy standards. Learn more.

How does Cymulate support compliance and data protection?

Cymulate ensures data security with encryption in transit (TLS 1.2+) and at rest (AES-256), secure AWS-hosted data centers, a robust Secure Development Lifecycle, and GDPR compliance. The platform also features 2FA, RBAC, and IP restrictions. See details.

Who can benefit from using Cymulate?

Cymulate is designed for CISOs, security leaders, SecOps teams, red teams, and vulnerability management teams in organizations of all sizes and industries, including finance, healthcare, retail, and more. Learn more.

What customer feedback has Cymulate received about ease of use?

Customers consistently praise Cymulate for its intuitive interface, ease of implementation, and actionable insights. For example, Raphael Ferreira, Cybersecurity Manager, said, "Cymulate is easy to implement and use—all you need to do is click a few buttons, and you receive a lot of practical insights into how you can improve your security posture." See more testimonials.

How does Cymulate compare to other security validation platforms?

Cymulate stands out with its unified platform combining BAS, CART, and Exposure Analytics, continuous threat validation, AI-powered insights, and ease of use. Customers report measurable outcomes such as a 52% reduction in critical exposures and an 81% reduction in cyber risk within four months. See comparisons.

What case studies demonstrate Cymulate's effectiveness?

Hertz Israel reduced cyber risk by 81% in four months using Cymulate. Nemours Children's Health improved detection in hybrid environments, and a sustainable energy company scaled penetration testing efficiently. Read case studies.

What is Cymulate's approach to continuous threat exposure management (CTEM)?

Cymulate enables organizations to implement CTEM by continuously validating, prioritizing, and remediating exposures. According to Gartner, organizations with CTEM are three times less likely to suffer a breach. Learn more.

How does Cymulate support a threat-informed defense strategy?

Cymulate Exposure Validation continuously tests security controls against the latest threats and attack techniques, ensuring defenses are always prepared for current and emerging adversarial methods. Learn more.

What is Cymulate's vision and mission?

Cymulate's vision is to transform cybersecurity by enabling organizations to proactively validate defenses, identify vulnerabilities, and optimize their security posture. The mission is to empower teams to achieve measurable improvements in threat resilience and operational efficiency. About Cymulate.

How does Cymulate help organizations respond to emerging threats like Trigona?

Cymulate's platform is updated every two weeks with new features and daily threat intelligence, ensuring organizations can validate defenses against the latest ransomware and cyber threats, including Trigona. See platform updates.

What support resources does Cymulate provide for new customers?

Cymulate offers email and chat support, a knowledge base with technical articles and videos, webinars, e-books, and an AI chatbot for quick answers and best practices. Explore resources.

How does Cymulate's 'Threat (IoC) updates' feature improve resilience?

The 'Threat (IoC) updates' feature provides recommended Indicators of Compromise that can be exported and applied directly to security controls, helping organizations quickly build defenses against new threats. Learn more.

Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Case Study: Credit Union Boosts Threat Prevention & Detection with Cymulate
Learn More
New Research: Cymulate Research Labs Discovers Token Validation Flaw
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

Trigona (._locked) ransomware virus

December 8, 2022

A previously unnamed ransomware has rebranded under the name 'Trigona,' launching a new Tor negotiation site where they accept Monero as ransom payments. The ransom note says that all documents, databases, backups, and other data have been encrypted and leaked. It claims that decryption without contacting threat actors is impossible. All data will be sold to third parties if victims refuse to pay a ransom. It also urges victims to contact the attackers as soon as possible to avoid paying a higher price for data decryption because it increases every hour. Before paying a ransom, victims can have three files decrypted for free. The ransom note instructs victims to pay for data decryption via a Tor website. Examples of unreliable sources used by cybercriminals to distribute malware are Peer-to-Peer networks, unofficial (deceptive) pages, third-party downloaders, free file hosting pages, etc. Users infect computers via malicious JavaScript files, Microsoft Office, PDF, or other documents, executables, ISO files, archive files (like ZIP and RAR), etc. Threat Summary: Name: Trigona virus Threat Type: Ransomware, Crypto Virus, Files locker Encrypted Files Extension: ._locked Ransom Demanding Message: how_to_decrypt.hta Free Decryptor Available? No Cyber Criminal Contact: Chat on the provided Tor website Detection Names: Avast (Win32:RansomX-gen [Ransom]), Combo Cleaner (Gen:Variant.Fragtor.168126), ESET-NOD32 (A Variant Of Win32/Filecoder.OLC), Kaspersky (HEUR:Trojan-Ransom.Win32.Generic), Microsoft (Trojan:Win32/Wacatac.B!ml), Full List Of Detections (VirusTotal) Symptoms: Cannot open files stored on your computer, previously functional files now have a different extension (for example, my.docx.locked). A ransom demand message is displayed on your desktop. Cyber criminals demand payment of a ransom (usually in bitcoins) to unlock your files. Additional Information: Cybercriminals demand to be paid in Monero cryptocurrency. Distribution methods: Infected email attachments (macros), torrent websites, malicious ads. Damage: All files are encrypted and cannot be opened without paying a ransom. Additional password-stealing trojans and malware infections can be installed together with a ransomware infection. BleepingComputer analyzed a recent sample of Trigona and found it supports various command line arguments that determine whether local or network files are encrypted, if a Windows autorun key is added, and whether a test victim ID (VID) or campaign ID (CID) should be used. The command line arguments are listed below: /full /!autorun /test_cid /test_vid /path /!local /!lan /autorun_only A ransom note named how_to_decrypt.hta will be created in each scanned folder. This note displays information about the attack, a link to the Tor negotiation site, and a link that copies an authorization key into the Windows clipboard needed to log in to the Tor negotiation site.