The United States Health Sector Cybersecurity Coordination Center (HC3) issued a warning regarding Trinity ransomware, renowned for extorting cryptocurrency from its victims.
The US Health Sector Cybersecurity Coordination Center (HC3) released a profile of Trinity ransomware on October 4, a threat actor targeting sensitive data.
To fool victims into installing the ransomware on their computers, the assailants employ phishing emails, malicious websites, and software vulnerabilities.
Next, it searches the computer for sensitive information, accumulates it, and transmits it to hackers. Additionally, the ransomware encrypts the victim’s files using an algorithm, rendering them inoperable.
The ransomware generates a note after encrypting the files, informing its victims that it has extracted and encrypted their data. The note demands payment in exchange for a decryption key.
Hackers threaten victims to pay within 24 hours
The note also tells victims they have 24 hours to pay in crypto or their data will be leaked. HC3 wrote:
“Victims have 24 hours to contact the cybercriminals, and failure to do so will result in the stolen data being leaked or sold. Unfortunately, no known decryption tools are currently available for Trinity ransomware, leaving victims with few options.”
Healthcare providers are among the critical infrastructure that Trinity ransomware targets, according to HC3.
The ransomware had affected seven organizations, according to the government agency. According to HC3, Trinity ransomware has lately infiltrated at least one healthcare entity in the United States.
In 2023, Ransomware crypto payments exceeded $1 B
In 2023, high-profile institutions and infrastructure paid approximately $1.1 billion in cryptocurrency to ransomware perpetrators, according to Chainalysis’ 2024 Crypto Crime Report.
The report stated that various actors, including individuals, smaller criminal groups, and large-scale syndicates, conducted attacks last year.
In 2023, 538 new ransomware variants were developed, according to the report. Additionally, prominent organizations such as the BBC and British Airways were targeted.