Recent from talks
Nothing was collected or created yet.
Wizard Spider
View on WikipediaWizard Spider, also known as Trickbot, DEV-0193, UNC2053, or Periwinkle Tempest,[1] was a cybercrime group based in and around Saint Petersburg in Russia.[2][3][4] Some members may be based in Ukraine.[3] They are estimated to number about 80, some of whom may not know they are employed by a criminal organisation.[2][5]
The group has been a target of Europol, Interpol, FBI and also the National Crime Agency in the United Kingdom.[2]
History
[edit]In 2018 the groups began using Trickbot, Ryuk and Conti ransomware as their primary tools.[2]
The group is also responsible for developing the espionage software Sidoh, which only gathers information and does not hold it to ransom.[3][6] In 2020 their software infected three Minnesota medical facilities, locking staff out of computers,[7] which required court orders to try and force the hackers out of the command and control servers.[7][8]
By the start of February 2022 some internal communications from the group had been leaked.[9]
In late February 2022, members of the group initially supported the Russian invasion of Ukraine,[10][11] causing internal group communications to be leaked by an anonymous person in support of Ukraine.[12][13][14]
The groups servers were eventually shut down in 2022.[7][15]
In February 2023 United States Secretary of State Antony Blinken announced that the United States and United Kingdom had sanctioned seven men for allegedly spreading Conti, Ryuk and Trickbot malware.[16] Travel bans were imposed on them, their assets were seized and American and British companies and citizens are prohibited from conducting any business with them.[16] Their names were Vitaliy Kovalev, Valery Sedletski, Valentin Karyagin, Maksim Mikhailov, Dmitry Pleshevskiy, Mikhail Iskritskiy and Ivan Vakhromeyev.[16] Also, any foreign banks that knowingly provide significant services to those men could also be sanctioned.[16]
In September 2023 the USA and UK sanctioned another 11 men connected to Wizard Spider.[7] Their assets in the USA and UK are to be seized and travel bans imposed on them.[7] Wizard Spider was linked to Russian intelligence by the American government.[7] The men named were:
| Name | Role | Aliases |
|---|---|---|
| Andrey Zhuykov[7] | senior administrator[7] | Dif, Defender[7] |
| Maksim Galochkin[7] | test leader[7] | Bentley, Crypt, and Volhvb[7] |
| Maksim Rudenskiy[7] | software development leader[7] | |
| Mikhail Tsarev[7] | human resources and finance[7] | Mango, Alexander Grachev, Super Misha, Ivanov Mixail, Misha Krutysha, and Nikita Andreevich Tsarev[7] |
| Dmitry Putilin[7] | purchase of infrastructure[7] | Grad, Staff[7] |
| Maksim Khaliullin[7] | human resources manager, procurement of servers and other infrastructure[7] | Kagas[7] |
| Sergey Loguntsov[7] | software developer[7] | |
| Vadym Valiakhmetov[7] | software developer[7] | Weldon, Mentos, and Vasm[7] |
| Artem Kurov[7] | software developer[7] | Naned[7] |
| Mikhail Chernov[7] | internal utilities[7] | Bullet[7] |
| Alexander Mozhaev[7] | administrative team[7] | Green, Rocco[7] |
Other indictments were unsealed, including one in southern California against Maksim Galochkin, on three charges of hacking and deploying Conti on Scripps health hospitals.[7]
As of October 2024 it was disbanded.[17]
PRODAFT wrote a technical report describing their attacks and organisation. Attacks usually begin by sending large amounts of spam to targets in order to trick victims into downloading malware. They use Qbot and SystemBC malware, as well as writing their own. A separate team pinpoints valuable targets and uses Cobalt Strike to attack them. If they gain control of the system, they deploy ransomware.[18]
They have simultaneously transferred Bitcoin from Ryuk and Conti ransomware attacks into their own wallets, implying they are carrying out several attacks using different malware.[3]
They are very security conscious and do not openly advertise on the darknet. They will only work with or sell access to criminals they trust. They are known to belittle their victims via a leak site.[2] The leak site is also used to publish data they have stolen.[3]
Intelligence agencies say that the group does not attack targets in Russia, nor do key figures travel outside the country for fear of being arrested.[2][3] The Irish Times reports Wizard Spider software is programmed to uninstall itself if it detects that the system uses the Russian language or if the system has an IP address in the former Soviet Union.[3] However, research by PRODAFT found the majority of SystemBC-infected machines to be within Russia (20.5%).[18]
Russia is suspected of tolerating Wizard Spider and even assisting them.[3]
Suspected attacks
[edit]They are suspected of being behind the Health Service Executive cyberattack in the Republic of Ireland.[19][2] It is the largest known attack against a health service computer system.[3]
Key figures are suspected of being involved with online attacks using Dyre software.[2]
Associates
[edit]Members of the group have been linked to UNC1878, TEMP.MixMaster, and Grim Spider.[5]
A research report by Jon DiMaggio suggests the group is part of a collections of criminals known as the Ransom Cartel or Maze Cartel.[3] Other members include TWISTED SPIDER, VIKING SPIDER, LockBit gang and SunCrypt gang.[3] All use ransomware to extort money.[3][6] SunCrypt have since retired.[6]
The PRODAFT report authors found that Wizard Spider sometimes backed up data to a server and that the server contained data from systems that had also been attacked by REvil, though the authors could not conclude which of the two groups had taken the data.[18]
Naming of leader by German Police
[edit]In May 2025 the leader, known by the alias 'Stern', was named as Vitaly Nikolaevich Kovalev, a 36 year old man living in Russia.[20]
References
[edit]- ^ "How Microsoft names threat actors". Microsoft. Retrieved 21 January 2024.
- ^ a b c d e f g h Reynolds, Paul (18 May 2021). "'Wizard Spider': Who are they and how do they operate?". RTÉ News. Retrieved 18 May 2021.
- ^ a b c d e f g h i j k l Lally, Conor (18 May 2021). "Wizard Spider profile: Suspected gang behind HSE attack is part of world's first cyber-cartel". The Irish Times. Retrieved 19 May 2021.
- ^ Burgess, Matt (1 February 2022). "Inside Trickbot, Russia's Notorious Ransomware Gang". Wired. Retrieved 15 February 2022.
- ^ a b "Mapping To Wizard Spider". MITRE Shield. Mitre Corporation. Archived from the original on 28 January 2021. Retrieved 18 May 2021.
- ^ a b c DiMaggio, Jon. "Ransom Mafia - Analysis of the World's First Ransomware Cartel". Analyst1. Retrieved 19 May 2021.
- ^ a b c d e f g h i j k l m n o p q r s t u v w x y z aa ab ac ad ae af ag ah ai aj ak al Lyons, Jessica (7 September 2023). "US, UK sanction more Russians linked to Trickbot". The Register. Retrieved 2 October 2024.
- ^ Corfield, Gareth (12 October 2020). "Microsoft and chums use US trademark law to trash Trickbot malware network". The Register. Retrieved 2 October 2024.
- ^ Burgess, Matt (1 February 2022). "Inside Trickbot, Russia's Notorious Ransomware Gang". Wired. Retrieved 2 October 2024.
- ^ Reichert, Corinne (25 February 2022). "Conti Ransomware Group Warns Retaliation if West Launches Cyberattack on Russia". CNET. Retrieved 2 October 2024.
- ^ Bing, Christopher (25 February 2022). "Russia-based ransomware group Conti issues warning to Kremlin foes". Reuters. Retrieved 2 October 2024.
- ^ Corfield, Gareth (28 February 2022). "60,000 Conti ransomware gang messages leaked". The Register. Retrieved 2 October 2024.
- ^ Humphries, Matthew (28 February 2022). "Backing Russia Backfires as Conti Ransomware Gang Internal Chats Leak". PCMag. Retrieved 2 March 2022.
- ^ Faife, Corin (28 February 2022). "A ransomware group paid the price for backing Russia". The Verge. Retrieved 2 October 2024.
- ^ "Something strange is going on with Trickbot". Intel 471. 24 February 2022. Retrieved 2 October 2024.
- ^ a b c d Lyons, Jessica (10 February 2023). "Conti, Ryuk, Trickbot malware". The Register. Retrieved 2 October 2024.
- ^ Jones, Connor (1 October 2024). "Evil Corp's deep ties with Russia and NATO member attacks exposed". The Register. Retrieved 1 October 2024.
- ^ a b c Burt, Jeff (18 May 2022). "Meet Wizard Spider, the multimillion-dollar gang behind Conti, Ryuk malware". The Register. Retrieved 20 May 2022.
- ^ Burgess, Matt; Newman, Lily Hay (30 May 2025). "Cops in Germany Claim They've ID'd the Mysterious Trickbot Ransomware Kingpin". Wired. Archived from the original on 30 May 2025. Retrieved 30 June 2025.
External links
[edit]- Wizard Spider Group In-Depth Analysis - report by PRODAFT, 16 May 2022
Wizard Spider
View on GrokipediaOverview
Origins and Attribution
Wizard Spider, a cybercrime syndicate specializing in malware development and deployment, first surfaced publicly in September 2016 through the initial distribution of TrickBot, a modular banking trojan designed for credential theft and financial fraud, often offered via malware-as-a-service models.[1] Early operations focused on commodity malware campaigns targeting banking sectors, with TrickBot's modular architecture allowing rapid adaptation for various cybercrime purposes.[1] Attribution of Wizard Spider to Russian-speaking cybercriminals is supported by cybersecurity analyses from firms like CrowdStrike, which designate the group as originating from the Russian Federation based on infrastructure hosting, code artifacts, and operational behaviors.[1] Key indicators include malware self-deactivation upon detection of Russian-language environments or IP addresses from Russia and former Soviet republics, as well as a deliberate avoidance of victims in those regions to evade local law enforcement.[9] This pattern, observed in TrickBot samples, aligns with profit-driven actors operating under implicit tolerance from Russian authorities, who rarely prosecute such groups when they spare domestic targets.[9] The group's base is primarily linked to the Saint Petersburg area in Russia, with possible peripheral members in Ukraine, though core development and command-and-control infrastructure trace to Russian domains.[9] No evidence ties Wizard Spider to state sponsorship; instead, attributions emphasize autonomous cybercriminal motives, evolving from banking trojans to targeted ransomware without geopolitical objectives.[1][9] Shared tactics, techniques, and procedures (TTPs) across TrickBot and subsequent tools have enabled consistent tracking by threat intelligence providers, reinforcing the single-group attribution despite modular operations.[1]Primary Malware and Toolset
Wizard Spider's primary malware is TrickBot, a modular banking trojan first identified in 2016 and continuously developed by the group for initial access, credential theft, and network reconnaissance.[10] TrickBot supports capabilities such as data exfiltration of emails and credentials, host enumeration including UEFI/BIOS checks, and lateral movement via exploits like EternalBlue, often running from memory to evade detection.[10][5] Its modular architecture allows customization for tasks like cryptomining or serving as a dropper for ransomware, with infections exceeding 1 million systems globally by 2020.[4] The group deploys Ryuk ransomware as the culmination of TrickBot-enabled intrusions, typically after reconnaissance and privilege escalation, with the malware encrypting files using AES-256 and RSA-2048 algorithms and appending a .Ryuk extension.[5] Ryuk, derived from the Hermes ransomware variant, includes ransom notes demanding payment in Bitcoin via a ReadMe.html or .txt file, and has been linked to over $61 million in extorted funds since its emergence in 2018.[5][4] Post-2020 updates incorporated code obfuscation techniques to hinder analysis, such as anti-disassembly methods.[4] Wizard Spider's toolset extends beyond core malware to include BazarLoader, a backdoor and loader distributed via phishing emails mimicking legitimate software, which facilitates Cobalt Strike beacon deployment for command-and-control and further exploitation.[4] They also leverage Conti ransomware, introduced in June 2020, featuring selective encryption with ChaCha algorithms and a data leak site for extortion, compromising over 120 networks by late 2020.[4] Additional tools encompass Emotet for initial vector delivery leading to TrickBot, PowerShell scripts for evasion, and commercial frameworks like Cobalt Strike for persistence and lateral movement across the attack chain.[5][4] This ecosystem enables end-to-end operations from phishing or malvertising to ransomware execution.[10]History
Early Development (2016–2018)
Wizard Spider, a financially motivated cybercrime group, first surfaced in September 2016 with the release of TrickBot, a modular banking trojan initially designed for credential theft and financial fraud.[1] TrickBot emerged as a successor to earlier malware like Dyre, incorporating similar code structures, web injection techniques for manipulating banking websites, and operational tactics aimed at harvesting login credentials from infected systems.[11] The malware's core loader facilitated dynamic module downloads, enabling functions such as keylogging, screenshot capture, and data exfiltration to command-and-control servers.[12] In its early iterations from late 2016 through 2017, TrickBot primarily targeted financial institutions, with campaigns focusing on users in Europe and the United States through phishing emails and malvertising.[13] The group's development emphasized stealth and adaptability, using obfuscated payloads and anti-analysis measures to evade detection, while building a botnet infrastructure for scalable infections.[14] Attribution to Wizard Spider stems from consistent infrastructure overlaps, code signing certificates, and tactics observed in TrickBot operations, as analyzed by cybersecurity firms tracking the malware's propagation.[13] By 2018, TrickBot's modular framework had expanded to include additional capabilities like email harvesting and browser credential dumping, reflecting iterative refinements to support broader information-stealing operations beyond initial banking focus.[10] However, the group maintained a primary emphasis on financial gain through automated theft rather than destructive payloads, with no evidence of ransomware integration during this phase.[13] These enhancements positioned TrickBot as a versatile platform, setting the stage for future escalations while relying on underground forums for affiliate distribution.[15]Expansion into Ransomware (2018–2020)
In late 2018, Wizard Spider, previously focused on financial theft via the TrickBot banking trojan, expanded into ransomware operations by deploying Ryuk against large enterprises, adopting a "big game hunting" strategy targeting high-value organizations for substantial payouts.[3][4] Ryuk first appeared in August 2018, with its code derived from the earlier Hermes ransomware but customized for targeted extortion rather than widespread distribution.[3] This shift leveraged existing TrickBot infections for initial access—often delivered through phishing or Emotet droppers—followed by manual lateral movement using tools like PowerShell, RDP, and PsExec to deploy Ryuk after network reconnaissance, enabling encryption of critical systems and ransom demands in Bitcoin.[3][16] By 2019, Ryuk deployments intensified, with Wizard Spider refining tactics to prioritize U.S. and European firms in sectors like manufacturing and media, amassing over 705 BTC (approximately $3.7 million USD at the time) across 52 transactions by early 2019 alone, according to blockchain analysis of associated wallets.[3] The group's operations demonstrated a departure from TrickBot's automated wire fraud, emphasizing human-operated ransomware for higher yields, with demands escalating based on victim reconnaissance; for instance, following U.S. Department of Justice indictments in November 2018, operators adjusted Bitcoin addresses in ransom notes to evade tracking.[3] Mandiant observed this pattern in intrusions where TrickBot compromises rapidly escalated to Ryuk within weeks, confirming the integrated toolset.[16] Into 2020, Wizard Spider sustained Ryuk activity amid disruptions, temporarily pausing deployments from March to September before resuming with enhanced code obfuscation, while experimenting with alternatives like Conti ransomware introduced in June 2020.[4] The FBI later estimated Ryuk operations generated over $61 million USD in ransoms by mid-2020, underscoring the profitability of this expansion and Wizard Spider's adaptability in maintaining operational resilience post-initial TrickBot-focused era.[4] This period solidified their role in the ransomware ecosystem, with Ryuk exclusively controlled by the group unlike more commoditized malware.[3]Disruptions and Evolution (2020–Present)
In October 2020, Microsoft coordinated an international effort with partners including ESET, Lumen, and Recorded Future to disrupt the TrickBot botnet operated by Wizard Spider, seizing or rendering inoperable approximately 150 command-and-control domains and eliminating 94% of its critical infrastructure by October 18.[17][18] This action aimed to hinder the group's ability to deploy ransomware such as Ryuk, which relied on TrickBot for initial access and lateral movement in targeted attacks. Despite the setback, Wizard Spider demonstrated resilience by rapidly rebuilding infrastructure and adapting their modular toolkit, incorporating enhancements to evasion techniques and expanding deployment of alternative loaders like BazarLoader alongside continued use of TrickBot modules for credential harvesting and remote access.[4] By late 2020 and into 2021, the group evolved its ransomware operations, shifting emphasis from Ryuk to Conti, a Ransomware-as-a-Service (RaaS) variant they developed and deployed through TrickBot-compromised networks, targeting high-value sectors including healthcare and critical infrastructure for multimillion-dollar extortions.[2] Conti's architecture allowed affiliates to conduct double-extortion by exfiltrating data prior to encryption, amplifying financial pressure on victims. Operations persisted post-disruption, with TrickBot detections remaining prevalent despite a noted decline in overall efficacy due to improved defenses and modular updates that incorporated Cobalt Strike for persistence.[19] The group's trajectory shifted dramatically in early 2022 following Russia's invasion of Ukraine, when Conti operators publicly pledged support for the Russian government, prompting a rogue insider to leak over 60 terabytes of internal data—including source code, chat logs, and tools—exposing operational details and affiliates.[20] This breach eroded Conti's secrecy and operational cohesion, leading to its effective shutdown by mid-2022, though core Wizard Spider members repurposed leaked tools and crypters in successor strains like Black Basta while maintaining TrickBot for initial access.[21] Law enforcement responses intensified, with U.S. Treasury and DOJ sanctions in September 2023 targeting TrickBot's infrastructure and operators for ties to Russian intelligence, alongside UK actions, yet the group continued low-profile activities into 2025, leveraging evolved tactics such as phishing and exploit kits for persistence.[22] In May 2025, Operation Endgame 2.0 by Europol and partners disrupted TrickBot alongside other initial access brokers, but analysts note ongoing adaptations, positioning Wizard Spider as a enduring threat in Russia's cybercrime ecosystem despite repeated setbacks.[23][24]Operations
Initial Access Techniques
Wizard Spider primarily gains initial access to target networks through phishing campaigns delivering modular malware such as TrickBot and BazarLoader. TrickBot, operational since 2016, is often distributed via malicious spam (malspam) emails containing attachments or links, frequently leveraging Emotet as a vector until its disruption in September 2020; post-disruption, TrickBot campaigns resumed with unique configurations tagged for group identification, such as "mor131."[4] BazarLoader, observed in campaigns from March to September 2020, is deployed via spam emails mimicking legitimate business communications (e.g., complaints or phone call notifications) with links to compromised Google Docs, leading to loader and backdoor payloads, including PowerShell variants.[4] In Conti ransomware operations, which Wizard Spider shifted to prominently after mid-2020, initial access diversifies to include spearphishing with tailored attachments embedding scripts for malware like TrickBot, IcedID, or Cobalt Strike beacons.[25][26] Actors also exploit unpatched public-facing applications and vulnerabilities in external assets to achieve footholds without user interaction.[26] Additional vectors encompass credential-based access, particularly via stolen or weak Remote Desktop Protocol (RDP) credentials, often acquired from underground markets or initial access brokers within ransomware-as-a-service ecosystems.[25][26] Social engineering tactics, such as vishing (voice phishing) calls, and promotion of fake software through search engine optimization further facilitate entry, enabling subsequent deployment of ransomware like Conti or Ryuk.[25] These methods reflect Wizard Spider's evolution from banking trojan distribution to targeted "big game hunting," prioritizing high-value victims with minimal detection.[4]Lateral Movement and Persistence
Wizard Spider operators establish persistence through multiple mechanisms following initial access via malware such as TrickBot or BazarLoader. Common techniques include modifying registry run keys underHKCU\SOFTWARE\[Microsoft](/page/Microsoft)\Windows\CurrentVersion\Run and placing shortcuts in startup folders to ensure automatic execution upon user logon.[27] They also leverage Winlogon helper DLLs by altering HKLM\SOFTWARE\[Microsoft](/page/Microsoft)\Windows NT\CurrentVersion\Winlogon entries, such as Userinit configurations, to load malicious components during system boot.[28] Additionally, persistence is achieved by creating or modifying Windows services, exemplified by installing TrickBot as the ControlServiceA service, and scheduling tasks like "WinDotNet" to execute payloads periodically.[29][30] Account creation further supports long-term access, with local and domain admin accounts generated to facilitate ongoing operations.[30]
For lateral movement, the group exploits stolen credentials harvested via modules like TrickBot's pwgrab64 to traverse networks using legitimate remote services. Remote Desktop Protocol (RDP) is frequently employed for exploration and payload deployment across hosts.[29][27] Server Message Block (SMB) protocol and Windows Admin Shares enable file copying and execution, including dropping Cobalt Strike beacons on domain controllers from temporary directories.[31][32] Tools such as PsExec and services.exe are used for remote service execution, often in conjunction with pass-the-hash techniques via Invoke-SMBExec to propagate ransomware like Ryuk or Conti without alerting defenses.[30][3] Windows Management Instrumentation (WMI) and Windows Remote Management facilitate queries and command execution for broader network mapping and tool transfer.[29][27] PowerShell Empire, deployed as a service, aids in obfuscated script execution and reverse shells to maintain control during traversal, which can span days to months depending on network size.[3][29] These methods prioritize speed in high-value targets, as observed in Ryuk deployments achieving full encryption within hours.[31]
Ransomware Deployment and Extortion
Wizard Spider deploys ransomware such as Ryuk and Conti following initial access and lateral movement within victim networks, typically after reconnaissance to identify high-value targets.[4] The group disables defensive measures prior to encryption, including stopping backup services via commands liketaskkill.exe and net.exe, and deleting volume shadow copies using vssadmin and wmic.[32] Ryuk, introduced in August 2018, employs AES-256 and RSA-2048 encryption algorithms to lock files, appending the .Ryuk extension and leaving ransom notes with instructions for payment in Bitcoin via ProtonMail contacts.[3] Conti, deployed since June 2020, uses a ChaCha cipher for selective encryption focused on network shares and avoids encrypting files larger than 50 MB to preserve operational functionality.[4]
Prior to deployment, Wizard Spider exfiltrates sensitive data to enable double extortion, employing tools like Sidoh (also known as Ryuk Stealer), a keyword-based utility that scans drives for files matching extensions such as .docx, .pdf, and .xls, then uploads them via FTP to attacker-controlled servers.[33] Sidoh variants, observed from June 2019 to January 2020, incorporate deny lists to skip system files and use hardcoded IP addresses for transfer, facilitating the theft of proprietary, financial, or governmental documents.[33] Additional exfiltration occurs over command-and-control channels or alternative protocols like FTP and web services, with data staged for upload to cloud providers.[34]
Extortion involves demanding ransoms in cryptocurrency, with Ryuk victims collectively paying over $61 million according to FBI estimates, while Conti operations compromised more than 120 networks and publicized leaks on dedicated sites launched in August 2020.[4] The group pressures victims through hired callers and threats to release exfiltrated data, operating a ransomware-as-a-service model where affiliates receive shares of payments funneled through shared cryptocurrency addresses linking Ryuk and Conti proceeds.[6] Wizard Spider avoids targets in Russia and CIS countries, uninstalling malware upon detection of Russian-language systems or IP geolocation.[9]
