Fact-checked by Grok 2 weeks ago

Wizard Spider

Wizard Spider is a Russia-based cybercriminal designated by threat intelligence researchers as the primary operator of the modular banking trojan, which enables initial access, , and deployment of payloads such as Ryuk and Conti. The group first emerged in 2016 with TrickBot's distribution for financial fraud before pivoting in 2018 to "" tactics targeting high-value organizations for . Wizard Spider's toolkit includes Cobalt Strike beacons for command-and-control and custom loaders like BazarLoader, allowing modular adaptation to evade defenses and facilitate lateral movement in compromised networks. Its ransomware operations, particularly Ryuk, have inflicted significant damage on sectors including healthcare, manufacturing, and government, with attacks disrupting services and extracting ransoms in the millions of dollars. The syndicate's evolution to Conti ransomware by late 2019 marked a shift toward ransomware-as-a-service models, sharing infrastructure and tactics with Ryuk campaigns. Internal data leaks, such as the 2021 exposure and 2023 insider documents, have revealed hierarchical structures, developer identities, and operational details, yet the group persisted through tool updates and affiliate networks until disruptions from Russia's 2022 invasion of fragmented Russian-speaking ecosystems. actions, including U.S. seizures against infrastructure in 2021, highlighted vulnerabilities but did not dismantle core operations, underscoring the challenges in attributing and disrupting transnational entities reliant on resilient architectures.

Overview

Origins and Attribution

Wizard Spider, a cybercrime syndicate specializing in malware development and deployment, first surfaced publicly in September 2016 through the initial distribution of TrickBot, a modular banking trojan designed for credential theft and financial fraud, often offered via malware-as-a-service models. Early operations focused on commodity malware campaigns targeting banking sectors, with TrickBot's modular architecture allowing rapid adaptation for various cybercrime purposes. Attribution of Wizard Spider to Russian-speaking cybercriminals is supported by cybersecurity analyses from firms like , which designate the group as originating from the based on infrastructure hosting, code artifacts, and operational behaviors. Key indicators include malware self-deactivation upon detection of Russian-language environments or IP addresses from and former Soviet republics, as well as a deliberate avoidance of victims in those regions to evade local . This pattern, observed in samples, aligns with profit-driven actors operating under implicit tolerance from Russian authorities, who rarely prosecute such groups when they spare domestic targets. The group's base is primarily linked to the area in , with possible peripheral members in , though core development and command-and-control infrastructure trace to Russian domains. No evidence ties Wizard Spider to state sponsorship; instead, attributions emphasize autonomous cybercriminal motives, evolving from banking trojans to targeted without geopolitical objectives. Shared tactics, techniques, and procedures (TTPs) across and subsequent tools have enabled consistent tracking by threat intelligence providers, reinforcing the single-group attribution despite modular operations.

Primary Malware and Toolset

Wizard Spider's primary malware is , a modular banking trojan first identified in 2016 and continuously developed by the group for initial access, credential theft, and network reconnaissance. TrickBot supports capabilities such as of emails and credentials, host enumeration including / checks, and lateral movement via exploits like , often running from memory to evade detection. Its modular architecture allows customization for tasks like cryptomining or serving as a dropper for , with infections exceeding 1 million systems globally by 2020. The group deploys Ryuk ransomware as the culmination of TrickBot-enabled intrusions, typically after reconnaissance and privilege escalation, with the malware encrypting files using AES-256 and RSA-2048 algorithms and appending a .Ryuk extension. Ryuk, derived from the Hermes ransomware variant, includes ransom notes demanding payment in Bitcoin via a ReadMe.html or .txt file, and has been linked to over $61 million in extorted funds since its emergence in 2018. Post-2020 updates incorporated code obfuscation techniques to hinder analysis, such as anti-disassembly methods. Wizard Spider's toolset extends beyond core malware to include BazarLoader, a backdoor and loader distributed via phishing emails mimicking legitimate software, which facilitates Cobalt Strike beacon deployment for command-and-control and further exploitation. They also leverage Conti ransomware, introduced in June 2020, featuring selective encryption with ChaCha algorithms and a data leak site for extortion, compromising over 120 networks by late 2020. Additional tools encompass Emotet for initial vector delivery leading to TrickBot, PowerShell scripts for evasion, and commercial frameworks like Cobalt Strike for persistence and lateral movement across the attack chain. This ecosystem enables end-to-end operations from phishing or malvertising to ransomware execution.

History

Early Development (2016–2018)

Wizard Spider, a financially motivated group, first surfaced in September 2016 with the release of , a modular banking initially designed for theft and financial . emerged as a successor to earlier like Dyre, incorporating similar code structures, web injection techniques for manipulating banking websites, and operational tactics aimed at harvesting login credentials from infected systems. The malware's core loader facilitated dynamic module downloads, enabling functions such as keylogging, screenshot capture, and to command-and-control servers. In its early iterations from late 2016 through 2017, primarily targeted financial institutions, with campaigns focusing on users in and the through emails and . The group's development emphasized stealth and adaptability, using obfuscated payloads and anti-analysis measures to evade detection, while building a infrastructure for scalable infections. Attribution to Wizard Spider stems from consistent infrastructure overlaps, code signing certificates, and tactics observed in operations, as analyzed by cybersecurity firms tracking the 's propagation. By 2018, TrickBot's modular framework had expanded to include additional capabilities like harvesting and credential dumping, reflecting iterative refinements to support broader information-stealing operations beyond initial banking focus. However, the group maintained a primary emphasis on financial gain through automated theft rather than destructive payloads, with no evidence of integration during this phase. These enhancements positioned as a versatile platform, setting the stage for future escalations while relying on underground forums for affiliate distribution.

Expansion into Ransomware (2018–2020)

In late 2018, Wizard Spider, previously focused on financial theft via the banking , expanded into operations by deploying Ryuk against large enterprises, adopting a "" strategy targeting high-value organizations for substantial payouts. Ryuk first appeared in August 2018, with its code derived from the earlier Hermes ransomware but customized for targeted extortion rather than widespread distribution. This shift leveraged existing TrickBot infections for initial access—often delivered through or Emotet droppers—followed by manual lateral movement using tools like , RDP, and PsExec to deploy Ryuk after network reconnaissance, enabling encryption of critical systems and ransom demands in . By 2019, Ryuk deployments intensified, with Wizard Spider refining tactics to prioritize U.S. and European firms in sectors like manufacturing and media, amassing over 705 BTC (approximately $3.7 million USD at the time) across 52 transactions by early 2019 alone, according to blockchain analysis of associated wallets. The group's operations demonstrated a departure from TrickBot's automated wire fraud, emphasizing human-operated ransomware for higher yields, with demands escalating based on victim reconnaissance; for instance, following U.S. Department of Justice indictments in November 2018, operators adjusted Bitcoin addresses in ransom notes to evade tracking. Mandiant observed this pattern in intrusions where TrickBot compromises rapidly escalated to Ryuk within weeks, confirming the integrated toolset. Into 2020, Wizard Spider sustained Ryuk activity amid disruptions, temporarily pausing deployments from March to September before resuming with enhanced code obfuscation, while experimenting with alternatives like Conti ransomware introduced in June 2020. The FBI later estimated Ryuk operations generated over $61 million USD in ransoms by mid-2020, underscoring the profitability of this expansion and Wizard Spider's adaptability in maintaining operational resilience post-initial TrickBot-focused era. This period solidified their role in the ransomware ecosystem, with Ryuk exclusively controlled by the group unlike more commoditized malware.

Disruptions and Evolution (2020–Present)

In October 2020, coordinated an international effort with partners including , , and to disrupt the botnet operated by Wizard Spider, seizing or rendering inoperable approximately 150 command-and-control domains and eliminating 94% of its by October 18. This action aimed to hinder the group's ability to deploy such as Ryuk, which relied on for initial access and lateral movement in targeted attacks. Despite the setback, Wizard Spider demonstrated resilience by rapidly rebuilding infrastructure and adapting their modular toolkit, incorporating enhancements to evasion techniques and expanding deployment of alternative loaders like BazarLoader alongside continued use of modules for credential harvesting and remote access. By late 2020 and into 2021, the group evolved its ransomware operations, shifting emphasis from Ryuk to , a Ransomware-as-a-Service (RaaS) variant they developed and deployed through TrickBot-compromised networks, targeting high-value sectors including healthcare and for multimillion-dollar extortions. Conti's allowed affiliates to conduct double-extortion by exfiltrating prior to encryption, amplifying financial pressure on victims. Operations persisted post-disruption, with detections remaining prevalent despite a noted decline in overall efficacy due to improved defenses and modular updates that incorporated Cobalt Strike for . The group's trajectory shifted dramatically in early 2022 following Russia's invasion of , when Conti operators publicly pledged support for the government, prompting a rogue insider to leak over 60 terabytes of internal data—including , chat logs, and tools—exposing operational details and affiliates. This breach eroded Conti's secrecy and operational cohesion, leading to its effective shutdown by mid-2022, though core Wizard Spider members repurposed leaked tools and crypters in successor strains like Black Basta while maintaining for initial access. Law enforcement responses intensified, with U.S. Treasury and DOJ sanctions in September 2023 targeting 's infrastructure and operators for ties to , alongside actions, yet the group continued low-profile activities into 2025, leveraging evolved tactics such as and exploit kits for persistence. In May 2025, Operation Endgame 2.0 by and partners disrupted alongside other initial access brokers, but analysts note ongoing adaptations, positioning Wizard Spider as a enduring threat in Russia's ecosystem despite repeated setbacks.

Operations

Initial Access Techniques

Wizard Spider primarily gains initial access to target networks through campaigns delivering modular such as TrickBot and BazarLoader. , operational since 2016, is often distributed via malicious spam (malspam) emails containing attachments or links, frequently leveraging as a vector until its disruption in September 2020; post-disruption, TrickBot campaigns resumed with unique configurations tagged for group identification, such as "mor131." BazarLoader, observed in campaigns from March to September 2020, is deployed via spam emails mimicking legitimate business communications (e.g., complaints or phone call notifications) with links to compromised , leading to loader and backdoor payloads, including variants. In Conti ransomware operations, which Wizard Spider shifted to prominently after mid-2020, initial access diversifies to include spearphishing with tailored attachments embedding scripts for malware like TrickBot, IcedID, or Cobalt Strike beacons. Actors also exploit unpatched public-facing applications and vulnerabilities in external assets to achieve footholds without user interaction. Additional vectors encompass credential-based access, particularly via stolen or weak (RDP) credentials, often acquired from underground markets or initial access brokers within ransomware-as-a-service ecosystems. Social engineering tactics, such as (voice phishing) calls, and promotion of fake software through further facilitate entry, enabling subsequent deployment of like Conti or Ryuk. These methods reflect Wizard Spider's evolution from banking trojan distribution to targeted "big game hunting," prioritizing high-value victims with minimal detection.

Lateral Movement and Persistence

Wizard Spider operators establish persistence through multiple mechanisms following initial access via malware such as or BazarLoader. Common techniques include modifying registry run keys under HKCU\SOFTWARE\[Microsoft](/page/Microsoft)\Windows\CurrentVersion\Run and placing shortcuts in startup folders to ensure automatic execution upon user logon. They also leverage Winlogon helper DLLs by altering HKLM\SOFTWARE\[Microsoft](/page/Microsoft)\Windows NT\CurrentVersion\Winlogon entries, such as Userinit configurations, to load malicious components during system boot. Additionally, persistence is achieved by creating or modifying Windows services, exemplified by installing as the ControlServiceA service, and scheduling tasks like "WinDotNet" to execute payloads periodically. Account creation further supports long-term access, with local and domain admin accounts generated to facilitate ongoing operations. For lateral movement, the group exploits stolen credentials harvested via modules like TrickBot's pwgrab64 to traverse networks using legitimate remote services. (RDP) is frequently employed for exploration and payload deployment across hosts. (SMB) protocol and Windows Admin Shares enable file copying and execution, including dropping Cobalt Strike beacons on domain controllers from temporary directories. Tools such as PsExec and services.exe are used for remote service execution, often in conjunction with pass-the-hash techniques via Invoke-SMBExec to propagate like Ryuk or Conti without alerting defenses. (WMI) and facilitate queries and command execution for broader and tool transfer. PowerShell Empire, deployed as a service, aids in obfuscated script execution and reverse shells to maintain control during traversal, which can span days to months depending on network size. These methods prioritize speed in high-value targets, as observed in Ryuk deployments achieving full within hours.

Ransomware Deployment and Extortion

Wizard Spider deploys ransomware such as Ryuk and Conti following initial access and lateral movement within victim networks, typically after reconnaissance to identify high-value targets. The group disables defensive measures prior to encryption, including stopping backup services via commands like taskkill.exe and net.exe, and deleting volume shadow copies using vssadmin and wmic. Ryuk, introduced in August 2018, employs AES-256 and RSA-2048 encryption algorithms to lock files, appending the .Ryuk extension and leaving ransom notes with instructions for payment in Bitcoin via ProtonMail contacts. Conti, deployed since June 2020, uses a ChaCha cipher for selective encryption focused on network shares and avoids encrypting files larger than 50 MB to preserve operational functionality. Prior to deployment, Wizard Spider exfiltrates sensitive data to enable double , employing tools like Sidoh (also known as Ryuk Stealer), a keyword-based utility that scans drives for files matching extensions such as .docx, .pdf, and .xls, then uploads them via FTP to attacker-controlled servers. Sidoh variants, observed from June 2019 to January 2020, incorporate deny lists to skip system files and use hardcoded IP addresses for transfer, facilitating the theft of proprietary, financial, or governmental documents. Additional occurs over command-and-control channels or alternative protocols like FTP and web services, with data staged for upload to cloud providers. Extortion involves demanding ransoms in , with Ryuk collectively paying over $61 million according to FBI estimates, while Conti operations compromised more than 120 networks and publicized leaks on dedicated sites launched in August 2020. The group pressures through hired callers and threats to release exfiltrated , operating a ransomware-as-a-service model where affiliates receive shares of payments funneled through shared addresses linking Ryuk and Conti proceeds. Wizard Spider avoids targets in and CIS countries, uninstalling upon detection of Russian-language systems or IP geolocation.

Notable Attacks

Healthcare and Critical Infrastructure Targets

Wizard Spider has conducted multiple ransomware attacks on healthcare organizations, primarily using Ryuk in 2020 and Conti from 2021 onward, often initiating infections via malware to achieve initial access and lateral movement. These operations targeted the health and (HPH) sector, where Ryuk alone represented approximately one-third of reported incidents in the United States through October 2020. The group's tactics exploited vulnerabilities in unpatched systems and weak , leading to widespread and operational disruptions during a period of heightened strain from the . A prominent example occurred on September 27, 2020, when Ryuk ransomware struck Universal Health Services (UHS), affecting more than 400 facilities across 37 U.S. states, the United Kingdom, and Ireland. The attack rendered electronic health records, imaging systems, and communication tools inaccessible, forcing hospitals to revert to paper-based processes, divert ambulances, and delay non-emergency procedures. UHS reported restoring systems after about three weeks, with total losses estimated at $67 million, including lost revenue and remediation costs. Additional Ryuk deployments in October 2020 impacted facilities such as Sky Lakes Medical Center in Oregon and St. Lawrence Health in New York, contributing to a wave of nearly two dozen U.S. hospital disruptions. Following a temporary shift to Conti in early 2020, Wizard Spider resumed Ryuk usage but increasingly leveraged Conti for healthcare targets, as evidenced by the , 2021, on Ireland's (HSE), the national public health system. The Conti variant encrypted critical IT , including patient records and administrative systems, halting routine services, diagnostic testing, and programs amid the . HSE declined ransom payment, leading to and leaks on Conti's site; recovery efforts, involving system rebuilds and manual operations, incurred costs exceeding €100 million. Attribution to Wizard Spider stemmed from forensic linking the operation to the group's and tactics. While healthcare formed a core focus due to the sector's operational urgency and willingness to pay ransoms, Wizard Spider's Conti operations extended to other , including government and logistics entities. For instance, Conti affiliates disrupted Rican ministries and public services in April–May 2022, prompting a national emergency declaration and infrastructure outages. These attacks aligned with the group's broader evolution toward high-impact targets, though direct ties to Wizard Spider's core operators relied on blockchain and similarities between Conti and Ryuk. U.S. agencies noted the potential for such tactics to into broader failures, emphasizing the need for sector-specific defenses.

Corporate and Financial Victims

In 2021, Wizard Spider deployed Ryuk ransomware against Molson Coors, a multinational brewing corporation, disrupting operations across North American facilities including production halts and email outages starting March 15; the attack, linked to prior TrickBot infections, underscored the group's focus on high-revenue industrial targets. ExaGrid Systems, a U.S.-based data storage and backup technology firm, fell victim to a Conti ransomware attack in June 2021, resulting in encrypted systems and a confirmed ransom payment of $2.6 million to regain access, as disclosed by the company amid operational downtime. A Nokia subsidiary in Georgia, USA, suffered a data breach in August 2021 following a Conti ransomware incursion, exposing employee and customer information; the incident, part of broader corporate targeting, highlighted Wizard Spider's evolution from Ryuk to Conti for enterprise extortion. Conti operations, attributed to Wizard Spider, claimed Sea-Invest, a Belgian oil terminal operator, among over 50 corporate victims in March 2022, with leaked data indicating supply chain disruptions in energy logistics; such attacks netted the group an estimated $180 million annually from corporate ransoms. Financial sector victims remain sparsely documented in ransomware deployments, as Wizard Spider's initial TrickBot malware focused on banking trojan theft rather than encryption; however, the group's toolkit enabled data exfiltration from financial entities prior to Ryuk or Conti drops, with over 850 total victims across Conti leaks including implied corporate finance exposures.

Associates and Networks

Malware Ecosystem Partnerships

Wizard Spider, the cybercriminal group behind the malware and ransomware strains such as Ryuk and Conti, operates within a collaborative malware ecosystem characterized by affiliations with initial access brokers and tool-sharing arrangements with other threat actors. These partnerships enable the group to outsource network infiltration while focusing on deployment and , following a Ransomware-as-a-Service (RaaS) model where affiliates receive a share of proceeds in exchange for providing compromised access. For instance, TrickBot operators have expanded distribution through partnerships with cybercrime affiliates, who leverage the malware for banking trojan operations before handing off to Wizard Spider for execution. Evidence of inter-group cooperation includes shared infrastructure and modules with LUNAR SPIDER, the operators of BokBot (a variant of ). In February 2019, observed a LUNAR SPIDER affiliate distributing Wizard Spider's malware, indicating tactical alliances for mutual malware propagation. By March 2019, further analysis revealed the use of a shared module between BokBot and campaigns, suggesting or direct collaboration to enhance evasion and persistence across operations. Such arrangements extend to crypter tools developed by Wizard Spider (also tracked as ITG23), which Security identified in May 2022 as being adopted by diverse cybercriminals for obfuscating payloads, thereby broadening the group's influence through tool dissemination. Blockchain analysis by TRM Labs in April 2022 corroborated operational ties between Wizard Spider, Ryuk, and Conti, revealing shared wallet addresses and fund flows that link these variants under a unified ecosystem, with affiliates facilitating initial access sales to Wizard Spider actors. This integration positions Wizard Spider within a loose "cybercrime cartel" of Russian-speaking groups, including entities like Viking Spider () and Twisted Spider (GandCrab/ precursors), where mentors share hacking techniques, breached data, and infrastructure to maximize collective gains, as reported in July 2021 based on leaked communications and operational overlaps. These partnerships, while opportunistic, rely on non-aggression pacts to avoid intra-ecosystem conflicts, allowing Wizard Spider to scale attacks without developing all access vectors internally.

Affiliation with Broader Cybercrime Cartels

Wizard Spider operates within a interconnected Russian-speaking , where it functions both as a malware developer (primarily , active since 2016) and as a deployer, facilitating handoffs to affiliated operators for . The group has demonstrated operational overlap with ransomware-as-a-service (RaaS) models, using for initial access and lateral movement before deploying payloads like Ryuk (active since mid-2018, with FBI-estimated extortions exceeding $61 million) or (launched around August 2020, compromising over 120 networks). These connections are evidenced by shared codebases, such as modules integrated into Conti variants, and blockchain-traced payments linking actors across Ryuk and Conti operations, including a July 2021 transfer of $85,000 from a known Ryuk to salaries for Conti developers. Analyses indicate Conti emerged as a potential rebrand or evolution of Ryuk around May 2020, with Wizard Spider maintaining control over both through merged infrastructure by late 2021. This integration allowed Wizard Spider to expand its toolset, incorporating BazarLoader for broader infection vectors and Cobalt Strike for post-exploitation, often in tandem with Ryuk or Conti ransomware. While not a monolithic entity, the group collaborates opportunistically with access brokers and affiliates, such as through Emotet (operated by Mummy Spider) distributing TrickBot payloads as observed in October 2020. Claims of Wizard Spider's formal membership in a "Ransom Cartel" or ""—involving data-sharing and mentoring with groups like or —stem from observed technique exchanges among actors but lack structural evidence, as Maze operators publicly denied cartel formation in 2021. Instead, affiliations appear tactical, including loose ties to Qbot operators for modular enhancements and broader ecosystem partnerships where initial access is sold to ransomware affiliates. These dynamics reflect a profit-driven network rather than a centralized syndicate, with Wizard Spider's persistence evidenced by temporary disruptions like the September 2020 TrickBot takedown, which prompted rapid reconfiguration.

Leadership and Law Enforcement

Identified Key Figures

Vitaly Nikolaevich Kovalev, a 36-year-old national, has been identified by Federal Criminal Police (BKA) as the founder and leader of the group, synonymous with Wizard Spider, operating under the alias "." U.S. and U.K. authorities sanctioned him in February 2023 as a senior figure responsible for overseeing 's development and deployment, which enabled strains including Ryuk and Conti, resulting in hundreds of millions in extorted funds. Kovalev, also known by online monikers "" and "," facilitated the group's evolution from banking operations starting in 2016 into a broader ecosystem. Mikhail Tsarev, another Russian national using aliases such as "Mango," "Alexander Grachev," and "Super Misha," played a key role in deploying Trickbot and Conti malware within Wizard Spider's operations. He was indicted by a U.S. federal grand jury in September 2023 alongside associates for conspiracy to commit wire fraud and computer fraud in connection with Trickbot malware distribution and Conti ransomware attacks targeting global victims. Tsarev faced additional EU sanctions in June 2024 for enabling destructive cyber activities linked to the group. Maksim Galochkin, operating under handles "" and "Benalen," led a team of testers for Wizard Spider and contributed to the technical deployment of and Conti. Sanctioned by the U.S. and U.K. in September 2023, and by the in June 2024, Galochkin was charged in the same U.S. indictment as Tsarev for facilitating schemes that compromised and corporate networks worldwide. Among other sanctioned associates, Valery Sedletski and Valentin Karyagin, both Russians, were designated in February 2023 for their involvement in Trickbot's infrastructure, including and operational support, though their exact hierarchies remain less specified in public attributions. These identifications stem primarily from coordinated enforcement efforts, revealing Wizard Spider's hierarchical structure centered on Russian developers and operators evading capture through pseudonyms and jurisdictional protections.

Attribution Efforts and Takedowns

Attribution of activities to Wizard Spider has primarily relied on technical indicators shared by cybersecurity firms and law enforcement agencies, including overlapping infrastructure, malware signatures, and consistent tactics, techniques, and procedures (TTPs) observed in Trickbot deployments leading to Ryuk ransomware infections. Microsoft first publicly designated the actors as Wizard Spider in 2019, linking them to Trickbot's modular evolution into ransomware enablers based on command-and-control (C2) server analysis and infection chains affecting over a million devices since 2016. Mandiant tracked the group as UNC1878, attributing over 90% of Ryuk incidents to them through endpoint logging, lateral movement patterns like Cobalt Strike usage, and post-exploitation behaviors in victim networks from 2018 onward. CrowdStrike and ESET corroborated these links via reverse engineering of Trickbot variants and Ryuk payloads, noting code reuse and operational overlaps with Conti ransomware, which emerged as a successor strain around 2020. Law enforcement attribution efforts have integrated these private-sector insights, with the FBI issuing alerts in 2019 and 2020 identifying Wizard Spider's role in Ryuk attacks on U.S. healthcare and critical infrastructure, supported by indicators of compromise (IOCs) such as IP addresses and mutex names derived from seized malware samples. The group's Russian origins, centered around Saint Petersburg, were inferred from language in code comments, forum activity on Russian-speaking underground sites, and geolocation of C2 servers, though direct ties to state intelligence remain unproven beyond opportunistic alignments during geopolitical events. Challenges in attribution include the group's use of bulletproof hosting and virtual private servers to obfuscate origins, as well as rebranding to Conti, which complicated tracking but was resolved through persistent TTP analysis showing continuity in tools like AnchorDNS for lateral movement. Takedown efforts began with a coordinated disruption of infrastructure on October 6, 2020, when , , ' Labs, and NTT obtained U.S. court authorization to seize 37 domains and neutralize over 250 unique C2 servers, temporarily halting new infections and activations across six modules of the . This operation, involving global partners and preemptive legal actions under civil forfeiture laws, aimed to preempt surges ahead of the U.S. elections and reportedly delayed Ryuk deployments for weeks, though the group adapted by migrating to new infrastructure within months. Subsequent actions focused on sanctions rather than kinetic takedowns, given the actors' sanctuary in . In February 2023, the U.S. Treasury Department, coordinated with the , designated seven Russian nationals affiliated with Trickbot/Wizard Spider under Executive Order 13694 for malicious cyber activities, freezing assets and prohibiting U.S. dealings to disrupt financing of operations linked to Conti and Ryuk attacks since 2016. This was followed in September 2023 by sanctions on eleven additional Trickbot members, including developers of payloads, based on intelligence tying them to over $100 million in extorted funds and ties to Russian intelligence services. The added Trickbot-related entities to its cyber sanctions list in June 2024, targeting individuals involved in Wizard Spider's campaigns against EU . No public arrests of core members have occurred, attributable to jurisdictional barriers and lack of cooperation from .

Impact and Analysis

Economic and Operational Damages

Wizard Spider's ransomware operations, primarily via Conti and Ryuk strains deployed after compromises, have caused extensive economic losses through ransom demands, recovery expenditures, and productivity halts. In the May 2021 Conti attack on Ireland's (), initial recovery cost estimates reached €580 million (approximately $600 million USD), encompassing IT infrastructure replacement, cybersecurity enhancements, and operational downtime. By early 2022, confirmed expenditures exceeded €52 million ($57 million USD), including €20 million for core IT systems and €16 million for external consulting and support. Later assessments pegged total costs at over €100 million ($110 million USD), with ongoing expenses for system upgrades and lost productivity. These economic burdens extend beyond ransoms—Conti affiliates reportedly extracted at least $180 million globally in payments by 2023, though victims' total damages, including forensic investigations and restoration, multiply this figure. Ryuk deployments, active since 2018, similarly targeted high-value entities, with early operations yielding over $3.7 million in ransoms from victims, but aggregate losses escalated due to encrypted volumes and extended outages. Operationally, Wizard Spider attacks have disrupted critical services, particularly in healthcare, where Conti variant struck more infrastructure targets than any other in . The incident shut down nationwide IT systems for weeks, forcing manual operations, canceling elective procedures, postponing cancer screenings, and diverting emergency services, which compromised patient care continuity. Similar Conti incursions into U.S. healthcare and first-responder networks caused system-wide , halting electronic health records access and delaying treatments. Ryuk attacks, often following footholds, paralyzed hospital operations, as seen in compromises of managed service providers serving healthcare, leading to widespread service denials.

Strategic Implications for Cybersecurity

Wizard Spider's campaigns exemplify the professionalization of cybercrime through ransomware-as-a-service (RaaS) ecosystems, where initial access via malware like TrickBot or BazarLoader enables subsequent deployment of Conti or Ryuk ransomware against high-value targets, demanding defenders prioritize behavioral analytics and endpoint detection over static signatures to disrupt multi-stage attacks. Their routine exploitation of unpatched vulnerabilities, weak RDP credentials, and phishing vectors for lateral movement via SMB and PowerShell highlights the necessity of zero-trust architectures, including network segmentation, least-privilege access, and mandatory multi-factor authentication (MFA) to contain breaches before encryption or exfiltration occurs. The group's evolution to double-extortion tactics—stealing data for leak-site threats alongside encryption—amplifies recovery complexities, with Ryuk alone yielding over $61 million in ransoms by 2020, underscoring the strategic value of offline, immutable backups, prevention monitoring, and preemptive threat intelligence sharing to reduce dependency on payments that fund further operations. Targeting of , such as U.S. healthcare networks, further necessitates sector-specific resilience plans, including regular red-team exercises modeled on evaluations of Wizard Spider's techniques like credential dumping and defense evasion. Geopolitically, Wizard Spider's origins and pledges of support for actions—coupled with threats of retaliatory strikes against perceived adversaries—blur criminal and state-sponsored threats, complicating attribution and enforcement while emphasizing the need for public-private partnerships, on enablers, and adaptive policies like CISA's Known Exploited Vulnerabilities catalog to counter safe-haven dynamics in . This operational sophistication, evidenced by tool and Cobalt Strike usage, reinforces a broader shift toward continuous monitoring and automated response systems to outpace adversaries' rapid adaptations.

References

  1. [1]
    Wizard Spider - crowdstrike.com
    The group surfaced in September 2016 with their commodity banking malware most commonly known as TrickBot. Their operations changed significantly in August 2018 ...
  2. [2]
    WIZARD SPIDER (Threat Actor) - Malpedia
    The WIZARD SPIDER threat group is the Russia-based operator of the TrickBot banking malware. This group represents a growing criminal enterprise.
  3. [3]
    What is Ryuk Ransomware? The Complete Breakdown - CrowdStrike
    Jan 10, 2019 · Since August 2018, Ryuk Ransomware has been used to target enterprise environments. Threat actors operating it have netted over $3701893.98 ...
  4. [4]
    Wizard Spider Modifies and Expands Toolset [Adversary Update]
    Oct 16, 2020 · The CrowdStrike Intelligence team shares its analysis of key observations from WIZARD SPIDER's BazarLoader, Conti and Ryuk operations over ...<|control11|><|separator|>
  5. [5]
    [PDF] TrickBot, Ryuk, and the HPH Sector | HHS.gov
    Nov 12, 2020 · • TrickBot is run by cybercriminal group “WIZARD SPIDER” (named by CrowdStrike), UNC1878, or “Team9”. • Alleged to be affiliated with Russian ...
  6. [6]
    TRM Analysis Corroborates Suspected Ties Between Conti and ...
    Apr 5, 2022 · TRM investigators indicates ties between two ransomware groups, Conti and Ryuk. Both Conti and Ryuk also appear to be part of the Wizard Spider cybercriminal ...
  7. [7]
    [PDF] Russia's War Against Ukraine Disrupts the Cybercriminal Ecosystem
    Feb 23, 2023 · The so-called “brotherhood” of Russian-speaking threat actors located in the CIS has been damaged by insider leaks and group splintering, due to ...
  8. [8]
    Unmasking Trickbot, One of the World's Top Cybercrime Gangs
    Aug 30, 2023 · A WIRED investigation into a cache of documents posted by an unknown figure lays bare the Trickbot ransomware gang's secrets, including the ...
  9. [9]
    Wizard Spider: Taking A Look At The Notorious Russian Cybercrime ...
    Wizard Spider is a notorious Russian cybercrime group which is part of a larger cyber-cartel known as the Ransom Cartel or Maze Cartel.Missing: attribution | Show results with:attribution
  10. [10]
    [PDF] Fact Sheet: TrickBot Malware - CISA
    Mar 17, 2021 · The cybercrime group initially designed TrickBot as a banking trojan to steal financial data. Through continued development and new ...<|separator|>
  11. [11]
    TrickBot (Malware Family) - Malpedia
    A financial Trojan believed to be a derivative of Dyre: the bot uses very similar code, web injects, and operational tactics.Missing: early | Show results with:early
  12. [12]
    Win32/Trickbot threat description - Microsoft Security Intelligence
    Jun 3, 2020 · Trickbot is a modular trojan that first appeared in 2016. Trickbot can perform a number of actions on the infected device.
  13. [13]
    What is TrickBot Malware? - CrowdStrike
    Oct 2, 2023 · TrickBot malware is a banking Trojan released in 2016 that has since evolved into a modular, multi-phase malware capable of a wide variety ...
  14. [14]
    Threat Dissection: Trickbot - eSentire
    Trickbot malware was first observed in the wild in 2016, being utilized as a banking trojan similar to Emotet and Dyre.
  15. [15]
    Trickbot Malware Analysis - NetSecurity.com
    TrickBot is an advanced banking Trojan that was first identified in 2016. Malicious threat actors spread this trojan primarily by spearphishing campaigns.
  16. [16]
    It's Your Money and They Want It Now — The Cycle of Adversary ...
    Mar 31, 2020 · ... RYUK ransomware on hundreds of systems, finally revealing UNC1878's desired end goal. In the following weeks, we continued to encounter UNC1878 ...
  17. [17]
    Trickbot disrupted | Microsoft Security Blog
    Oct 12, 2020 · The Trickbot infrastructure was made available to cybercriminals who used the botnet as an entry point for human-operated campaigns, including ...
  18. [18]
    An update on disruption of Trickbot - Microsoft On the Issues
    Oct 20, 2020 · As of October 18, we've eliminated 94% of Trickbot's critical operational infrastructure including both the command-and-control servers in ...
  19. [19]
    TrickBot - Red Canary Threat Detection Report
    TrickBot is a modular banking trojan that targets users' financial information and acts as a dropper for other malware, including ransomware.
  20. [20]
    The rise and fall of the Conti ransomware group | Global Initiative
    Jun 27, 2023 · The message pledged allegiance and support for the full-scale Russian invasion of Ukraine, announced by Russian President Vladimir Putin the day ...
  21. [21]
    The Trickbot/Conti Crypters: Where Are They Now? - IBM
    Despite its shutdown, operators from the Conti syndicate remain active and collaborative in new factions. IBM Security X-force shares the intel.
  22. [22]
    U.S. DOJ, Treasury and U.K. Authorities Take Action Against ...
    Sep 6, 2023 · According to Treasury, the Trickbot group has ties to Russian intelligence services. Today's sanctions and the parallel criminal cases are the ...
  23. [23]
    Malware | Botnets disrupted worldwide...Operation Endgame is BACK
    May 23, 2025 · Operation Endgame 2.0 has targeted Bumblebee, Latrodectus, Qakbot, DanaBot, Trickbot, and WarmCookie. It's an operation focussed on initial access malware.
  24. [24]
    Wizard Spider Threat Actor Public Profile - Cybergeist
    Nov 15, 2024 · Wizard Spider, also known as ITG23, DEV-0193, Trickbot Group, Fin12, and Grimspider, is a prominent cybercrime group.
  25. [25]
    Conti Ransomware | CISA
    Mar 9, 2022 · Updated February 28, 2022: Conti cyber threat actors remain active and reported Conti ransomware attacks against U.S. and international ...Missing: methods | Show results with:methods
  26. [26]
    Conti Ransomware Gang: An Overview - Palo Alto Networks Unit 42
    Jun 18, 2021 · We've followed Conti ransomware for more than a year through our work helping organizations respond to ransomware attacks.
  27. [27]
  28. [28]
  29. [29]
    Timelining GRIM SPIDER's Big Game Hunting Tactics | CrowdStrike
    May 30, 2019 · Once TrickBot is executed, new enumeration modules are downloaded onto the compromised machine to facilitate WIZARD SPIDER's spread in search of ...Missing: timeline | Show results with:timeline
  30. [30]
  31. [31]
  32. [32]
  33. [33]
    An Analysis of Sidoh: WIZARD SPIDER's Exfiltration Tool
    Aug 31, 2021 · In this blog post, CrowdStrike Intelligence takes a deep dive into Sidoh (aka Ryuk Stealer), WIZARD SPIDER's mysterious keyword-based ...
  34. [34]
    Wizard Spider - MITRE ATT&CK®
    May 12, 2020 · Wizard Spider ; ID: G0102 ; Associated Groups: UNC1878, TEMP.MixMaster, Grim Spider, FIN12, GOLD BLACKBURN, ITG23, Periwinkle Tempest, DEV-0193.
  35. [35]
    Ransomware Activity Targeting the Healthcare and Public Health ...
    Nov 2, 2020 · This advisory describes the tactics, techniques, and procedures (TTPs) used by cybercriminals against targets in the Healthcare and Public Health (HPH) Sector
  36. [36]
    Universal Health Services Ransomware Attack Cripples IT Systems ...
    Sep 29, 2020 · The cyberattack crippled its IT systems, leaving affected hospitals without access to their computer and phone systems.
  37. [37]
    A Ransomware Attack Has Struck a Major US Hospital Chain - WIRED
    Sep 28, 2020 · An emergency room technician at one UHS-owned facility tells WIRED that their hospital has moved to all-paper systems as a result of the attack.
  38. [38]
    What is Ryuk ransomware? | Ryuk virus - Cloudflare
    The parties who operate Ryuk pursue bigger targets and charge heftier ransoms than most ransomware attackers. Ryuk attacks are unusual in that they involve ...Missing: transition | Show results with:transition
  39. [39]
    RYUK Ransomware | Trend Micro (US)
    Ryuk is ransomware version attributed to the hacker group WIZARD SPIDER that has compromised governments, academia, healthcare, manufacturing, and technology ...
  40. [40]
    Ransomware Hits Dozens of Hospitals in an Unprecedented Wave
    Oct 29, 2020 · A fresh wave of ransomware attacks has struck almost two dozen United States hospitals and health care organizations in recent weeks.Missing: toolset | Show results with:toolset
  41. [41]
    [PDF] Lessons Learned from the HSE Cyber Attack - HHS.gov
    Mar 2, 2022 · The Health Service Executive (HSE) of Ireland is the country's publicly funded healthcare system under the Irish. Department of Health ...Missing: critical | Show results with:critical
  42. [42]
    Conti ransomware syndicate behind attack on Irish health service
    May 17, 2021 · More details continue to emerge of the significant ransomware attack on Ireland's HSE ... Conti ransomware gang, also known as Wizard Spider ...
  43. [43]
    Conti ransomware attack on Ireland's healthcare system may cost ...
    Mar 23, 2022 · The cybercriminals (Russian-based Wizard Spider) used Conti ransomware within a malicious Microsoft Excel file attached to a phishing email. SEE ...
  44. [44]
    What is Conti Ransomware? - Akamai
    Conti ransomware is a ransomware as a service (RaaS) operation notorious for aggressive attacks on a broad range of public and private organizations.
  45. [45]
    TIR-20211004 An In-Depth Look at Ransomware Gang, Conti
    Nov 11, 2021 · A Russian-speaking RaaS organization, Conti uses RaaS to deploy disruptive ransomware attacks that target critical infrastructures.
  46. [46]
  47. [47]
  48. [48]
    Conti Ransomware Gang Claims 50+ New Victims including Oil…
    Mar 7, 2022 · eSentire Warns Ukraine & its Western Allies of Conti's Long History of Disrupting Critical Infrastructure. Could Conti Be the Perpetrator ...
  49. [49]
    Ransomware gang Conti published data of 850 companies - Group-IB
    Jun 23, 2022 · In two years, the ransomware operators attacked more than 850 victims including corporations, government agencies, and even a whole country.
  50. [50]
    Trickbot spreads malware through new distribution channels
    Oct 19, 2021 · TrickBot operators are back and expand the distribution channels with partnership with cybercrime affiliates. The operators behind the ...<|separator|>
  51. [51]
    WIZARD SPIDER and LUNAR SPIDER Sharing the Same Web
    Feb 15, 2019 · CrowdStrike Intelligence observed a new campaign from a LUNAR SPIDER affiliate to distribute WIZARD SPIDER's TrickBot malware on Feb. 7, 2019.
  52. [52]
    New Evidence Proves Ongoing WIZARD SPIDER / LUNAR SPIDER ...
    Mar 20, 2019 · On March 17, 2019, CrowdStrike® Intelligence observed the use of a new BokBot (developed and operated by LUNAR SPIDER) proxy module in conjunction with ...Missing: ecosystem | Show results with:ecosystem
  53. [53]
    ITG23 Crypters Highlight Cooperation Between Cybercriminal Groups
    May 19, 2022 · IBM Security X-Force researchers have continually analyzed the use of several crypters developed by the cybercriminal group ITG23, ...
  54. [54]
    The world's top ransomware gangs have created a cybercrime "cartel"
    Jul 22, 2021 · Russian cybercriminal gangs are mentoring younger groups and sharing hacking techniques, tools and data breach details.
  55. [55]
  56. [56]
    United States and United Kingdom Sanction Members of Russia ...
    Feb 9, 2023 · The United States, in coordination with the United Kingdom, is designating seven individuals who are part of the Russia-based cybercrime gang Trickbot.
  57. [57]
    Vitaly Nikolayevich Kovalev - Secret Service
    ... Kovalev in relation to his position as a senior figure within the Trickbot trojan virus organization. Relevant Links. U.S. Secret Service Press Release ...
  58. [58]
    United States and United Kingdom Sanction Additional Members of ...
    Sep 7, 2023 · The United States, in coordination with the United Kingdom, sanctioned eleven individuals who are part of the Russia-based Trickbot cybercrime group.Missing: Wizard Spider
  59. [59]
    Multiple Foreign Nationals Charged in Connection with Trickbot ...
    Sep 7, 2023 · According to the FBI, in 2021, Conti ransomware was used to attack more critical infrastructure victims than any other ransomware variant. “The ...
  60. [60]
    Cyber-attacks: six persons added to EU sanctions list for malicious ...
    Jun 24, 2024 · In addition, Mikhail Tsarev and Maksim Galochkin, key players in the deployment of the malwares 'Conti' and 'Trickbot' and involved in 'Wizard ...Missing: names | Show results with:names
  61. [61]
    [PDF] B COUNCIL DECISION (CFSP) 2019/797 of 17 May ... - EUR-Lex
    Jun 24, 2024 · Maksim Galochkin is also known by the online monikers 'Benalen', ... threat group 'Wizard Spider'. He has led a group of testers, with.
  62. [62]
    US and UK sanction cyber criminals in coordinated action
    Feb 17, 2023 · The individuals (who are said to be part of the Russia-based cybercrime gang Trickbot) are: Vitaliy Kovalev; Valery Sedletski; Valentin Karyagin ...
  63. [63]
    New action to combat ransomware ahead of U.S. elections
    Oct 12, 2020 · Today we took action to disrupt a botnet called Trickbot, one of the world's most infamous botnets and prolific distributors of ransomware.
  64. [64]
    Actors behind Ryuk testing different operations, challenging attribution
    Jan 26, 2021 · UNC1878 powered more than 90% of Ryuk-related ransomware attacks, according to Mandiant research. But “not every UNC1878 intrusion ends in ...Missing: enforcement actions
  65. [65]
    ESET takes part in global operation to disrupt Trickbot
    Oct 12, 2020 · ESET has collaborated with partners Microsoft, Lumen's Black Lotus Labs, NTT Ltd. and others in an attempt to disrupt Trickbot botnets.
  66. [66]
    Russian State-Sponsored and Criminal Cyber Threats to Critical ...
    May 9, 2022 · Cyber threat actors from the following Russian government and military organizations have conducted malicious cyber operations against IT and/or ...
  67. [67]
    U.S., U.K. Sanction 7 Men Tied to Trickbot Hacking Group
    Feb 9, 2023 · Authorities in the United States and United Kingdom today levied financial sanctions against seven men accused of operating “Trickbot,” a cybercrime-as-a- ...
  68. [68]
  69. [69]
    Irish Ransomware Attack Recovery Cost Estimate: $600 million
    The recovery costs for the May ransomware attack on Health Service Executive, Ireland's publicly funded healthcare system, is likely to total $600 million, ...
  70. [70]
    Ransomware Attack: Ireland's Cleanup Costs Hit $48 Million
    Feb 24, 2022 · So far, the costs have included an additional $14 million spent on IT infrastructure, $6 million on cybersecurity and strategic support, $17 ...
  71. [71]
    HSE to Pay a Huge Cost After Major 2021 Ransomware Attack
    Jul 1, 2022 · The Conti Ransomware Attack May Cost Ireland Over $100 million. Contents: What Happened?
  72. [72]
    11 alleged Conti criminals hit with UK and US sanctions
    Sep 8, 2023 · The Conti ransomware gang is believed to be responsible for extorting at least $180m globally and was behind the HSE cyberattack in 2021.
  73. [73]
    [PDF] Conti Ransomware and the Health Sector | HHS.gov
    Jul 8, 2021 · How has ransomware evolved over time? o Standard attack: Deploy ransomware, demand ransom o Managed Service Provider (MSP) compromise.
  74. [74]
    [PDF] Conti Ransomware Attacks Impact Healthcare and First Responder ...
    May 20, 2021 · This data is provided to help cyber security professionals and system administrators guard against the persistent malicious actions of cyber.
  75. [75]
  76. [76]
    Wizard Spider + Sandworm - ATT&CK® Evaluations
    Sandworm Team's most notable attacks include the 2015 and 2016 targeting of Ukrainian electrical companies and 2017's NotPetya attacks. Sandworm Team has been ...Missing: toolset | Show results with:toolset
  77. [77]