Detect, Respond, Protect
See how the global Huntress SOC can augment your team
with 24/7 coverage and unmatched human expertise.
Start your free trial today.
Wicked Spider, a financially-motivated threat actor and a component of the Chinese nexus group Wicked Panda, emerged as a key cyber adversary. Known for its dual capability of criminal profit-making and state-sponsored espionage, Wicked Spider leverages advanced techniques like spear-phishing, supply chain attacks, and certificate theft to target industries globally, with a strong focus on gaming and technology.
Wicked Spider targets the theft of intellectual property, confidential business data, and financial resources. It operates with two key motives—achieving monetary profit through cybercrime and advancing state intelligence objectives.
The group employs spear-phishing campaigns, exploiting vulnerabilities in public-facing systems, and compromising supply chains to achieve access. It frequently uses stolen code-signing certificates to distribute sophisticated malware while evading detection.
Their procedures involve using the Winnti malware family, leveraging legitimate tools for stealth (“living off the land”), and utilizing open-source solutions for lateral movement. Supply chain implants and modular toolsets allow flexibility in delivering customized payloads based on specific objectives.
One of Wicked Spider’s most significant campaigns involved breaching gaming companies to harvest code-signing certificates. These were subsequently used to disguise malicious software. Similarly, in 2020, the U.S. Department of Justice indicted members of APT41, attributing years-long campaigns targeting high-tech and gaming companies to groups like Wicked Spider.
In 2020, global law enforcement efforts resulted in the indictment of seven individuals linked to APT41. These charges underline the growing international crackdown on state-backed and criminal cyber actors like Wicked Spider.
To reduce risk, organizations should prioritize securing their supply chains, strengthening email defenses, and closely monitoring certificate usage for suspicious activity.
Strong cyber hygiene combined with advanced tools like endpoint detection and response (EDR) are essential—helping teams spot indicators of compromise, track abnormal endpoint behavior, and deliver actionable threat intelligence to stop attacks before they succeed.