Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io
Cloud Threat Landscape
/Incidents
Incidents
/
Trigona targeting MSSQL servers

Trigona targeting MSSQL servers

Type
Campaign
Actors
📐Trigona operator
Pub. date
April 17, 2023
Initial access
Software misconfig1-day vulnerability
Impact
RansomOp
Observed techniques
Password bruteforcingVulnerability exploitation
Observed tools
Trigona
Targeted technologies
Microsoft SQL Server
References
https://asec.ahnlab.com/en/51343/
Status
Finalized
Last edited
Jun 2, 2024 8:02 AM

Microsoft SQL servers were observed being attacked through brute-force or dictionary attacks that exploit weak account credentials. The servers were then used as entry points to deploy Trigona ransomware and encrypt all files

Once the attackers gain access to a server, they deploy malware dubbed CLR Shell to harvest system information, alter the account's configuration, and escalate privileges to LocalSystem. CLR Shell is a type of CLR assembly malware that receives commands from the attackers and performs malicious actions.

To launch the ransomware, the attackers exploit CVE-2016-0099, a vulnerability in the Windows Secondary Logon Service, which is required to launch the ransomware as a service on the compromised server. In the next stage, they install a dropper malware as the svcservice.exe service, and use it to launch the Trigona ransomware process which impersonatessvchost.exe.

Made with 💙 by Wiz

Last Updated: April 3, 2025