Detect, Respond, Protect
See how the global Huntress SOC can augment your team
with 24/7 coverage and unmatched human expertise.
Start your free trial today.
Viking Spider is a cybercriminal group known for developing and deploying the Ragnar Locker ransomware. Emerging in late 2019, the group employs big game hunting (BGH) tactics to target high-value organizations. They are linked to the broader "Ransom Cartel," a network of ransomware operators.
The group primarily focuses on financial extortion through ransomware attacks, targeting industries with high-value data.
They gain initial access through phishing campaigns and exploit vulnerabilities in remote desktop protocols (RDP). Once inside, they deploy Ragnar Locker ransomware to encrypt data.
Use of Ragnar Locker ransomware
Hosting data leak sites on Tor
Proof of data exfiltration before full leaks
Avoiding targets in Russia and former Soviet states
2020: Initiated data leak extortion campaigns, threatening to publish stolen data.
2021: Linked to ransomware attacks on critical infrastructure and healthcare facilities.
There have been no confirmed arrests of Viking Spider members. However, global law enforcement agencies, including Europol and the FBI, continue to monitor their activities.
Regularly update and patch systems.
Implement multi-factor authentication (MFA).
Conduct phishing awareness training.
Huntress solutions help protect organizations by monitoring endpoints, detecting intrusions, and mitigating threats with enterprise-grade technology.