Threat Actor Profile

Wicked Spider

Wicked Spider, a financially-motivated threat actor and a component of the Chinese nexus group APT41, emerged as a key cyber adversary. Known for its dual capability of criminal profit-making and state-sponsored espionage, Wicked Spider leverages advanced techniques like spear-phishing, supply chain attacks, and certificate theft to target industries globally, with a strong focus on gaming and technology.

Threat Actor Profile

Wicked Spider

Country of Origin

Wicked Spider originates from China, with credible links to state-sponsored operations potentially directed by the Ministry of State Security. Its role in carrying out sophisticated cyberattacks aligns with broader Chinese cybersecurity strategies.

Members

The exact number of individuals in Wicked Spider is not publicly disclosed. It is believed to operate as part of, or alongside, the larger APT41 collective, also known as Winnti, Barium, and Wicked Panda. This overlap enables dynamic and scalable operations, blending espionage and financial motivations.

Leadership

Specific leadership figures of Wicked Spider remain unknown. However, the group is broadly considered a criminal division of APT41, which operates with decentralized coordination under the umbrella of state directives and opportunistic financial pursuits.

Wicked Spider TTPs

Tactics

Wicked Spider targets the theft of intellectual property, confidential business data, and financial resources. It operates with two key motives—achieving monetary profit through cybercrime and advancing state intelligence objectives.

Techniques

The group employs spear-phishing campaigns, exploiting vulnerabilities in public-facing systems, and compromising supply chains to achieve access. It frequently uses stolen code-signing certificates to distribute sophisticated malware while evading detection.

Procedures

Their procedures involve using the Winnti malware family, leveraging legitimate tools for stealth (“living off the land”), and utilizing open-source solutions for lateral movement. Supply chain implants and modular toolsets allow flexibility in delivering customized payloads based on specific objectives.

Want to Shut Down Threats Before They Start?

Notable Cyberattacks

One of Wicked Spider’s most significant campaigns involved breaching gaming companies to harvest code-signing certificates. These were subsequently used to disguise malicious software. Similarly, in 2020, the U.S. Department of Justice indicted members of APT41, attributing years-long campaigns targeting high-tech and gaming companies to groups like Wicked Spider.

Law Enforcement & Arrests

In 2020, global law enforcement efforts resulted in the indictment of seven individuals linked to APT41. These charges underline the growing international crackdown on state-backed and criminal cyber actors like Wicked Spider.

How to Defend Against Wicked Spider

1

To reduce risk, organizations should prioritize securing their supply chains, strengthening email defenses, and closely monitoring certificate usage for suspicious activity. 

2

Strong cyber hygiene combined with advanced tools like endpoint detection and response (EDR) are essential—helping teams spot indicators of compromise, track abnormal endpoint behavior, and deliver actionable threat intelligence to stop attacks before they succeed.




Detect, Respond, Protect

See how the global Huntress SOC can augment your team
with 24/7 coverage and unmatched human expertise.
Start your free trial today.

Try Huntress for Free