First detected in November 2024, BlackNevas ransomware (also known as Trial Recovery) has evolved into a global double-extortion threat, impacting healthcare, finance, manufacturing, legal, and telecom sectors across Asia, Europe, and North America. This ransomware supports Windows, Linux, NAS devices, and VMware ESXi, combining AES-RSA encryption with aggressive data theft. Files are renamed with a distinctive “.-encrypted” extension, and victims receive ransom notes instructing them to negotiate via email or Telegram, under threat of public data leaks.
BlackNevas is a Trigona-family ransomware variant operating independently outside the typical Ransomware-as-a-Service model. Key characteristics include:
Dual Encryption Mechanism: AES encrypts victim files while RSA protects the keys, rendering files undecryptable without the attacker’s private key.
Multi-Platform Capability: Targets Windows, Linux, NAS devices, and ESXi hypervisors.
Delivery Methods: Phishing campaigns and exploitation of unpatched vulnerabilities.
Modular Command-Line Options: Attackers use switches like /full
, /path
, /fast
to control encryption scope, and /erase
or /shdwn
to delete data or force shutdown.
Operational Stealth: Skips critical OS files to keep systems bootable but locked.
Extortion Tactics: Publishes stolen file inventories on leak sites to coerce payment.
Global Reach: Nearly half of campaigns have hit Asia-Pacific, with notable attacks in Japan, Thailand, and South Korea, along with incidents in the UK, Italy, Lithuania, and the US.
Patch and Update Systems: Regularly update OS, NAS devices, and virtualization platforms like VMware ESXi to close known vulnerabilities.
Enforce Strong Access Controls: Apply least-privilege principles, limit admin rights, and secure sensitive data with strict access policies.
Continuous Monitoring: Deploy EDR solutions to detect unusual encryption activity, file renaming, or lateral movement.
Offline Backups: Maintain and routinely test offline or immutable backups to enable ransomware-free recovery.
Network Segmentation: Isolate critical assets to prevent ransomware from spreading laterally.
MD5 Hashes
2374998cffb71f3714da2075461a884b
4a1864a95643b0211fa7ad81b676fe2e
9f877949b8cbbb3adfe07fd4411b9f26
f2547a80dd64dcd5cba164fe4558c2b6
SHA1 Hashes
203f81cbe35c64071f52f34afbbbfc7d61b3e702
2a79c999e20c5d8102e0b728733cc8eba2b4d8ac
3226ebfc23dbe1a6cc44c3255d1a0e12f0dd153c
49551cb0bbc2da3f6d36523a005af5ee1f5ad1a8
812d65b67ce28905f5e07ac1f82b827ebd36470a
923be026c79e7b5b5d29461420887fe2e8875b01
SHA256 Hashes (Samples)
23642a78addcffd124db133a2dd2fcd2d1bdb060dd1e41da33cb18eec7a88867
3d09e930305cb3aa4ca54a39b0e3749f083d432f202606c8adac8455014b47fc
c08a752138a6f0b332dfec981f20ec414ad367b7384389e0c59466b8e10655ec
Email Addresses
amsomar[@]consultant[.]com
black4over[@]newlookst[.]com
suppcarter[@]uymail[.]com
paymeuk[@]consultant[.]com
TOR Address
hxxp[:]//ctyfftrjgtwdjzlgqh4avbd35sqrs6tde4oyam2ufbjch6oqpqtkdtid[.]onion
Recent Breach Victims
cartonajesbernabeu.com
oftaltech.com
sistran.com
toyota-asia.com
taniabe.co.jp
ckpower.co.th
clearsynth.com
Initial Access: T1566 (Phishing), T1190 (Exploit Public-Facing Applications), T1078 (Valid Accounts)
Execution: T1203 (Exploitation for Client Execution), T1059 (Command & Scripting Interpreter)
Persistence: T1547 (Boot/Logon Autostart), T1547.001 (Registry Run Keys/Startup Folder)
Privilege Escalation: T1068 (Exploitation for Privilege Escalation)
Defense Evasion: T1070 (Indicator Removal), T1562 (Impair Defenses), T1027 (Obfuscated Files/Information)
Discovery: T1083 (File & Directory Discovery), T1012 (Query Registry), T1135 (Network Share Discovery)
Impact: T1486 (Data Encrypted for Impact), T1561.001 (Disk Content Wipe)
Command & Control: T1071 (Application Layer Protocol)
Get through updates and upcoming events, and more directly in your inbox