Trident File Locker
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 80 % (High) |
Infected Computers: | 31 |
First Seen: | March 27, 2017 |
Last Seen: | August 5, 2022 |
OS(es) Affected: | Windows |
At first glance, the Trident File Locker looks like an innocent program for securing data. However, the Trident File Locker is a powerful encryption tool that can be used for numerous nefarious sources. PC security researchers have observed quite a bit of activity on underground forums and the Dark Web referring to the Trident File Locker. One such message reads as follows:
'You can lock up any folders using this awesome beast! Surprised I know already what VIDEO's you will HIDE. HurhurHurhur HAHA! Just kidding...
Please don't just comment with THANKS, THANK YOU and ETC. Comment with kindness. :biggrin:
If you have a good heart donate some BITCOIN to keep me going. 17KRGpLB4BLWh1MLfGoNS38h7mJsSgdK3w Thanks! Wanna work something out? Or you wanna buy some bulk email:pass fresh dump for a cheap of amount PM me now. I am new to this forum and I'm still working on it to become a VIP. So if you could send some CREDITS that would be nice.
I am selling unchecked RUSSIAN emails. Payment through BITCOIN or leakforums CREDITS only
My top DONATORS<3<3
|LS4|-1.65$|Odessa loves water melons And more to come........ You wan't your name will appear in every post of mine? Donate now!
Tired of the ads? Donate now to get your password and free from those ads. FacepalmFacepalmBlobby Note: You need to donate up to 350+Credits or 1$+ for you to be eligible. BTC ONLY'
It is clear that the Trident File Locker has been released publicly in an attempt to gain notoriety. Currently, PC security researchers are careful not to allow this encryption engine to fall into the wrong hands, but it is widely available at the time of writing.
How the Trident File Locker could be Used for Evil
PC security researchers are concerned about the possibility of software being released for innocent purposes, such as for 'education,' to be intended for illicit activities (as was the case with the release of HiddenTear, an encryption ransomware engine that spawned countless ransomware Trojans since its public release). In the case of the Trident File Locker, it is clear that this powerful tool could be used by extortionists to make certain data, such as child pornography, inaccessible to law enforcement (as seems to be implied by the forum post mentioned above). It is also possible that the Trident File Locker's encryption method could be integrated into ransomware attacks to create new ransomware families that use different encryption methods to bypass security protections and PC security analysis's methods.
How the Encryption Ransomware Trojans Work and the Trident File Locker's Role
Encryption ransomware Trojans are among the most common forms of threats today. Unfortunately, they are also among the most devastating. This is because the files that are encrypted in an attack involving these threats will remain inaccessible completely even after the Trojan is removed. Essentially, these attacks function by using a strong encryption method to lock the victim out of their files completely. These encryption methods can vary from one attack to the other. Apart from advanced, custom encryption, most ransomware attacks use a combination of the AES and RSA encryption made available publicly in combination with a ransomware engine with the release of the HiddenTear project. Other methods include using RAR or 7z archives that are password protected to prevent victims accessing their data. The public release of the Trident File Locker could add a new encryption method to a con artists' arsenal.
It is important to note that programs like the Trident File Locker have legitimate uses and are an important part of keeping online data safe and allowing software developers to keep their intellectual property secure. However, the same encryption methods that do this are also used in these attacks to take over the victims' data. One worrying aspect of the Trident File Locker is that its release and current availability make it abundantly clear that the Trident File Locker is being marketed as a hacking tool, to allow con artists to carry out shady activities.
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.