Top Qs
Timeline
Chat
Perspective

Wizard Spider

Russian cybercrime organization From Wikipedia, the free encyclopedia

Remove ads

Wizard Spider, also known as Trickbot, DEV-0193, UNC2053, or Periwinkle Tempest,[1] was a cybercrime group based in and around Saint Petersburg in Russia.[2][3][4] Some members may be based in Ukraine.[3] They are estimated to number about 80, some of them may not know they are employed by a criminal organisation.[2][5]

The group has been a target of Europol, Interpol, FBI and also the National Crime Agency in the United Kingdom.[2]

Remove ads

History

Summarize
Perspective

In 2018 the groups began using Trickbot, Ryuk and Conti ransomware as their primary tools.[2]

The group is also responsible for developing the espionage software Sidoh, which only gathers information and does not hold it to ransom.[3][6] In 2020 their software infected three Minnesota medical facilities, locking staff out of computers,[7] which required court orders to try and force the hackers out of the command and control servers.[7][8]

By the start of February 2022 some internal communications from the group had been leaked.[9]

In late February 2022, members of the group initially supported the Russian invasion of Ukraine,[10][11] causing internal group communications to be leaked by an anonymous persons in support of Ukraine.[12][13][14]

The groups servers were eventually shut down in 2022.[7][15]

In February 2023 United States Secretary of State Antony Blinken announced that the United States and United Kingdom had sanctioned seven men for allegedly spreading Conti, Ryuk and Trickbot malware.[16] Travel bans were imposed on them, their assets were seized and American and British companies and citizens are prohibited from conducting any business with them.[16] Their names were Vitaliy Kovalev, Valery Sedletski, Valentin Karyagin, Maksim Mikhailov, Dmitry Pleshevskiy, Mikhail Iskritskiy and Ivan Vakhromeyev.[16] Also, any foreign banks that knowingly provide significant services to those men could also be sanctioned.[16]

In September 2023 the USA and UK sanctioned another 11 men connected to Wizard Spider.[7] Their assets in the USA and UK are to be seized and travel bans imposed on them.[7] Wizard Spider was lined to Russian intelligence by the American government.[7] The men named were:

More information Name, Role ...

Other indictments were unsealed, including one in southern California against Maksim Galochkin, on three charges of hacking and deploying Conti on Scripps health hospitals.[7]

As of October 2024 it was disbanded.[17]

Remove ads

Modus operandi

Summarize
Perspective

PRODAFT wrote a technical report describing their attacks and organisation. Attacks usually begin by sending large amounts of spam to targets in order to trick victims into downloading malware. They use Qbot and SystemBC malware, as well as writing their own. A separate team pinpoints valuable targets and uses Cobalt Strike to attack them. If they gain control of the system, they deploy ransomware.[18]

They have simultaneously transferred Bitcoin from Ryuk and Conti ransomware attacks into their own wallets, implying they are carrying out several attacks using different malware.[3]

They are very security conscious and do not openly advertise on the darknet. They will only work with or sell access to criminals they trust. They are known to belittle their victims via a leak site.[2] The leak site is also used to publish data they have stolen.[3]

Intelligence agencies say that the group does not attack targets in Russia, nor do key figures travel outside the country for fear of being arrested.[2][3] The Irish Times reports Wizard Spider software is programmed to uninstall itself if it detects that the system uses the Russian language or if the system has an IP address in the former Soviet Union.[3] However, research by PRODAFT found the majority of SystemBC-infected machines to be within Russia (20.5%).[18]

Russia is suspected of tolerating Wizard Spider and even assisting them.[3]

Remove ads

Suspected attacks

They are suspected of being behind the Health Service Executive cyberattack in the Republic of Ireland.[19][2] It is the largest known attack against a health service computer system.[3]

Key figures are suspected of being involved with online attacks using Dyre software.[2]

Associates

Members of the group have been linked to UNC1878, TEMP.MixMaster, and Grim Spider.[5]

A research report by Jon DiMaggio suggests the group is part of a collections of criminals known as the Ransom Cartel or Maze Cartel.[3] Other members include TWISTED SPIDER, VIKING SPIDER, LockBit gang and SunCrypt gang.[3] All use ransomware to extort money.[3][6] SunCrypt have since retired.[6]

The PRODAFT report authors found that Wizard Spider sometimes backed up data to a server and that the server contained data from systems that had also been attacked by REvil, though the authors could not conclude which of the two groups had taken the data.[18]

Remove ads

References

Loading content...
Loading related searches...

Wikiwand - on

Seamless Wikipedia browsing. On steroids.

Remove ads