Threat Actor Profile
Indrik Spider
Indrik Spider, also known as Evil Corp, is a highly sophisticated Russian cybercriminal syndicate active since at least 2014. Best known for developing the Dridex banking Trojan and orchestrating large-scale ransomware campaigns, the group has targeted high-profile sectors worldwide, including healthcare and finance, causing severe monetary and operational damages.
Threat Actor Profile
Indrik Spider
Country of Origin
Members
Leadership
Indrik Spider TTPs
Tactics
The group primarily focuses on financial theft through ransomware and banking malware, leveraging sophisticated techniques to target high-value entities ("big-game hunting"). Their goals are monetary gain and large-scale disruption.
Techniques
Indrik Spider employs phishing schemes, advanced persistent threats (APTs), and credential theft to infiltrate systems. Techniques often involve the deployment of malware like Dridex and ransomware variants such as DoppelPaymer, with lateral movement strategies ensuring extensive infiltration before execution.
Procedures
Their methods include initial access through phishing campaigns exploitation of unpatched vulnerabilities, and code signing to evade detection. Once inside, they exfiltrate data, encrypt systems, and execute double-extortion tactics by threatening to leak sensitive information unless the ransom is paid.
Want to Shut Down Threats Before They Start?
Notable Cyberattacks
NHS Ransomware Attack (2017)
Funke Mediengruppe (2020)
University Hospital Düsseldorf Attack (2020)
Law Enforcement & Arrests
Ongoing efforts to apprehend key members like Maksim Yakubets highlight the involvement of international law enforcement agencies. The United States Department of Justice has taken significant steps, including issuing indictments and reward offers.
How to Defend Against Indrik Spider
Implement Multi-Factor Authentication (MFA): Protect all accounts, especially administrative ones.
Regularly Update and Patch Systems: Fix known vulnerabilities to prevent exploits.
Security Awareness Training: Educate employees on recognizing phishing and social engineering tactics.
Monitor Network Traffic: Detect abnormal patterns of data exfiltration or lateral movement.
Offline Backup Practices: Safeguard important data in secure, disconnected locations.
Huntress tools and services can provide proactive monitoring and incident response capabilities, equipping organizations to counter Indrik Spider’s threats effectively.
References
Detect, Respond, Protect
See how the global Huntress SOC can augment your team
with 24/7 coverage and unmatched human expertise.
Start your free trial today.