Threat Actor Profile
Wizard Spider
Wizard Spider is a prolific Russia-linked cybercrime syndicate, active since at least 2016. Known for its connection to TrickBot and Conti ransomware operations, the group specializes in financially motivated cyberattacks, leveraging advanced malware, phishing campaigns, and double extortion ransomware tactics. Their operations impact critical sectors worldwide, reflecting their cartel-like structure and sophisticated methods.
Threat Actor Profile
Wizard Spider
Country of Origin
Members
Leadership
Wizard Spider TTPs
Tactics
Wizard Spider predominantly engages in financially motivated attacks, carrying out high-profile Big-Game-Hunting (BGH) ransomware campaigns. They aim to maximize monetary gain, frequently targeting critical infrastructure and large enterprises.
Techniques
The group relies heavily on phishing campaigns with malicious attachments or links to gain initial access. They also deploy commodity loaders like TrickBot, BazarLoader, and compromised credentials. Once inside, they leverage tools like PowerShell, Cobalt Strike, and custom malware to move laterally and maintain persistence.
Procedures
Wizard Spider uses advanced procedures, including data exfiltration and double extortion tactics, where sensitive data is stolen prior to encryption and leveraged to pressure victims into paying ransom. They iterate quickly, adapting to circumvent detection measures and improve operational impact.
Want to Shut Down Threats Before They Start?
Notable Cyberattacks
Conti Ransomware Campaigns (2019–2021)
Healthcare Targeting
Law Enforcement Exposure (2022)
Law Enforcement & Arrests
Law enforcement efforts in 2022–2023, including sanctions and indictments, have disrupted aspects of Wizard Spider’s operations. Despite these interventions, the group's activity persists, often through splinter entities or evolved attack techniques.
How to Defend Against Wizard Spider
Enforce MFA on all remote access points and administrative interfaces.
Harden remote services (RDP, VPN) and isolate internet-exposed systems.
Deploy EDR solutions to detect behavioral anomalies and living-off-the-land attacks.
Segment networks and minimize excessive access privileges.
Regularly back up data in secure, offline locations to prevent total loss in ransomware scenarios.
Huntress Managed EDRhelps identify and neutralize early-stage intrusions, such as phishing campaigns, business email compromise, and malicious loaders, strengthening defenses against sophisticated threats like Wizard Spider.
References
Detect, Respond, Protect
See how the global Huntress SOC can augment your team
with 24/7 coverage and unmatched human expertise.
Start your free trial today.