Wizard Spider

Also known as: GRIM SPIDER, UNC1878, TEMP.MixMaster, Gold Blackburn
Affiliation Cybercriminal (Russian)
Motivation Financial
Status inactive
Country Russia
First Seen 2016
Last Seen 2024
Target Geographies Global, United States, Europe

Executive Summary

Wizard Spider is a Russian cybercriminal group responsible for the TrickBot botnet, Conti ransomware, and Ryuk ransomware operations. Active since at least 2016, the group operated one of the most prolific and financially damaging cybercriminal enterprises until Conti’s dissolution in mid-2022 following the leak of internal communications. Wizard Spider is estimated to have extorted hundreds of millions of dollars from victims worldwide.

The group operated a sophisticated organizational structure with specialized teams for malware development, infrastructure management, negotiation, and money laundering. The February 2022 “Conti Leaks” — triggered by a member’s response to the Russia-Ukraine war — exposed internal chat logs, source code, and operational details, providing unprecedented visibility into ransomware group operations.

Notable Campaigns

2018-2021 — Ryuk Ransomware Operations

Wizard Spider (operating as GRIM SPIDER) deployed Ryuk ransomware against enterprise and healthcare targets, demanding ransoms ranging from $200,000 to over $14 million. Ryuk was delivered through TrickBot infections and was among the first ransomware families to conduct targeted “big game hunting.”

2020-2022 — Conti Ransomware Operations

Conti replaced Ryuk as Wizard Spider’s primary ransomware, operating as a RaaS with a large affiliate network. Conti accumulated over 700 victims and was one of the most active ransomware operations. The group targeted healthcare organizations during the COVID-19 pandemic and attacked the Costa Rican government (May 2022), which declared a national state of emergency.

2016-2022 — TrickBot Botnet

The TrickBot botnet served as the primary distribution and access platform for Wizard Spider’s operations, with an estimated 1 million infected devices at its peak. TrickBot evolved from a banking trojan into a modular malware platform used for reconnaissance, credential theft, and ransomware deployment.

Technical Capabilities

Wizard Spider maintained a mature malware development organization. TrickBot provided modular capabilities including banking credential theft, network reconnaissance, and ransomware deployment. BazarLoader served as a stealthier successor for high-value target access. Anchor framework provided an advanced persistent backdoor for longer-duration operations.

Conti ransomware used multi-threaded AES encryption for fast network-wide deployment and operated with a dedicated negotiation team, data leak site, and cryptocurrency laundering infrastructure. The Conti Leaks revealed the group employed over 100 people in various roles.

Attribution

U.S. and UK authorities have identified and sanctioned multiple Wizard Spider members. The U.S. Treasury sanctioned TrickBot/Conti-associated individuals in February 2023, and the UK’s NCA participated in the investigation. The Conti Leaks provided extensive evidence of Russian-based operations, including chat logs identifying members by pseudonym and real identity.

MITRE ATT&CK Profile

Initial Access: TrickBot/BazarLoader infections via phishing (T1566.001), exploitation of public-facing applications (T1190), and access broker purchases (T1078).

Execution: PowerShell (T1059.001), WMI (T1047), and Cobalt Strike beacons.

Impact: Ransomware encryption (T1486), data theft for double extortion, shadow copy deletion (T1490), and service disruption (T1489).

Sources & References