A new ransomware threat called Trinity is targeting the healthcare sector.
The U.S. Department of Health and Human Services has issued a warning about Trinity, which exfiltrates sensitive data before encrypting files using the ChaCha20 encryption algorithm. The ransomware group employs sophisticated double extortion tactics and has affected organizations in multiple sectors, including healthcare, retail, and education.
Trinity's operations include a victim support site for decryption assistance and a leak site listing its victims. https://www.bankinfosecurity.com/feds-warn-health-sector-new-trinity-ransomware-threats-a-26468 (Oct. 07, 2024).
Quoting from the Health Sector Cybersecurity Coordination Center public information release:
Trinity ransomware was first seen around May 2024. It is a type of malicious software that infiltrates systems through several attack vectors, including phishing emails, malicious websites, and exploitation of software vulnerabilities. Upon installation, Trinity ransomware begins gathering system details such as the number of processors, available threads, and connected drives to optimize its multi-threaded encryption operations. Next, Trinity ransomware will attempt to escalate its privileges by impersonating the token of a legitimate process. This allows it to evade security protocols and protections. Additionally, Trinity ransomware performs network scanning and lateral movement, indicating its ability to spread and carry out attacks across multiple systems in a targeted network. Once inside the system, Trinity ransomware employs a double extortion strategy to target its victims. It seems to exfiltrate the victim's data before initiating encryption. It encrypts the victim's files using a robust encryption algorithm, rendering them unusable without the correct decryption key. The ransomware typically appends the ".trinitylock" file extension to the affected files, making it clear which ones have been compromised. https://www.hhs.gov/sites/default/files/trinity-ransomware-threat-actor-profile.pdf (Oct. 04, 2024).
Commentary
First prevention step, make certain healthcare personnel in charge of cybersecurity are aware of the new Trinity risk. Here again is the link to the online pdf that describes Trinity in detail: https://www.hhs.gov/sites/default/files/trinity-ransomware-threat-actor-profile.pdf (Oct. 04, 2024).
Next is to train employees on phishing and other social engineering tactics that lead to the accidental downloading of the Trinity ransomware. Most malware attacks, including ransomware attacks, are the result of human error.
Here are some personal considerations for preventing Trinity and other forms of malware:
- Respond quickly if you receive reports of spam coming from your account.
- Install security software, including anti-virus and anti-spyware software, and pop-up blockers.
- Maintain a firewall on all computers and devices.
- Set your security software, Internet browser, and operating system to update automatically.
- Back-up your data regularly to prevent lost data if your computer becomes infected and crashes.
- Set your browser's security setting to detect unauthorized downloads.
- Do not select links or open any attachments in emails unless you are familiar with the link or attachment.
- Only download and install software from trusted websites.
- Avoid downloading free online software.
- Never select any links in a pop-up window.
- Never download software in response to an unexpected pop-up, especially if it claims to have detected malware on your computer.
- Remember that most legitimate organizations will never ask for personal or account information through email.
- Never respond to spam.
- Never reveal personal or financial information in response to an email request.
- Use common sense. If an offer sounds too good to be true, it probably is.
- Confirm requests for information by contacting the sender by phone, using the number on an invoice or legitimate email.
- Tell others who use your devices, including your children, about how to avoid malware.
- If you suspect your device has malware, immediately disconnect from the Internet, and keep your device disconnected until the malware is removed.