Home > List all groups > Indrik Spider

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link APT group: Indrik Spider

NamesIndrik Spider (CrowdStrike)
Gold Drake (SecureWorks)
Evil Corp (self given)
CountryRussia Russia
MotivationFinancial crime, Financial gain
First seen2014
Description(CrowdStrike) Indrik Spider is a sophisticated eCrime group that has been operating Dridex since June 2014. In 2015 and 2016, Dridex was one of the most prolific eCrime banking rojans on the market and, since 2014, those efforts are thought to have netted Indrik Spider millions of dollars in criminal profits. Throughout its years of operation, Dridex has received multiple updates with new modules developed and new anti-analysis features added to the malware.

In August 2017, a new ransomware variant identified as BitPaymer was reported to have ransomed the U.K.’s National Health Service (NHS), with a high ransom demand of 53 BTC (approximately $200,000 USD). The targeting of an organization rather than individuals, and the high ransom demands, made BitPaymer stand out from other contemporary ransomware at the time. Though the encryption and ransom functionality of BitPaymer was not technically sophisticated, the malware contained multiple anti-analysis features that overlapped with Dridex. Later technical analysis of BitPaymer indicated that it had been developed by Indrik Spider, suggesting the group had expanded its criminal operation to include ransomware as a monetization strategy.

Indrik Spider appears to be a subgroup of TA505, Graceful Spider, Gold Evergreen. In 2019, a subgroup of Indrik Spider split off into Doppel Spider.

Dridex has been observed to be distributed via Necurs (operated by Monty Spider) and Emotet (operated by Mummy Spider, TA542).
ObservedSectors: Financial, Government, Healthcare.
Countries: Worldwide.
Tools usedBitPaymer, Cobalt Strike, Cridex, Dridex, EmpireProject, Hades, Mimikatz, PowerSploit, PsExec, WastedLocker.
Operations performedAug 2017Several hospitals part of the NHS Lanarkshire board were hit on Friday by a version of the Bit Paymer ransomware.
The NHS Lanarkshire board includes hospitals such as Hairmyres Hospital in East Kilbride, Monklands Hospital in Airdrie and Wishaw General Hospital.
Jul 2018BitPaymer Ransomware Paralyzes IT Systems of the Alaskan Town
Jan 2019Arizona Beverages knocked offline by ransomware attack
May 2019BitPaymer Ransomware Leveraging New Custom Packer Framework Against Targets Across the U.S.
Aug 2019Apple Zero-Day Exploited in New BitPaymer Campaign
Oct 2019Pilz, one of the world's largest producers of automation tools, has been down for more than a week after suffering a ransomware infection.
Nov 2019Everis, an NTT DATA company and one of Spain's largest managed service providers (MSP), had its computer systems encrypted today in a ransomware attack, just as it happened to Spain's largest radio station Cadena SER (Sociedad Española de Radiodifusión).
May 2020WastedLocker: A New Ransomware Variant Developed By The Evil Corp Group
Jul 2020Garmin services and production go down after ransomware attack
Dec 2020INDRIK SPIDER Supersedes WastedLocker with Hades Ransomware to Circumvent OFAC Sanctions
Counter operationsOct 2015In the fall of 2015, the Dell SecureWorks Counter Threat Unit (CTU) research team collaborated with the UK National Crime Agency (NCA), the U.S. Federal Bureau of Investigation (FBI), and the Shadowserver Foundation to take over the Dridex banking trojan.
Dec 2019Russian National Charged with Decade-Long Series of Hacking and Bank Fraud Offenses Resulting in Tens of Millions in Losses and Second Russian National Charged with Involvement in Deployment of “Bugat” Malware
Dec 2019Treasury Sanctions Evil Corp, the Russia-Based Cybercriminal Group Behind Dridex Malware

Last change to this card: 16 May 2021

Download this actor card in PDF or JSON format

Thailand Computer Emergency Response Team (ThaiCERT)
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1234
PGP Download PGP key