Indrik Spider is a Russia-based cybercriminal group that has been active since at least 2014. Indrik Spider initially started with the Dridex banking Trojan, and then by 2017 they began running ransomware operations using BitPaymer, WastedLocker, and Hades ransomware. Following U.S. sanctions and an indictment in 2019, Indrik Spider changed their tactics and diversified their toolset.[1][2][3]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1047 | Windows管理规范 |
Indrik Spider has used WMIC to execute commands on remote computers.[6] |
|
| Enterprise | T1555 | .005 | 从密码存储中获取凭证: Password Managers |
Indrik Spider has accessed and exported passwords from password managers.[5] |
| Enterprise | T1036 | .005 | 伪装: Match Legitimate Name or Location |
Indrik Spider used fake updates for FlashPlayer plugin and Google Chrome as initial infection vectors.[1] |
| Enterprise | T1112 | 修改注册表 |
Indrik Spider has modified registry keys to prepare for ransomware execution and to disable common administrative utilities.[5] |
|
| Enterprise | T1136 | 创建账户 |
Indrik Spider used |
|
| .001 | Local Account |
Indrik Spider has created local system accounts and has added the accounts to privileged groups.[5] |
||
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
Indrik Spider has used PowerShell Empire for execution of malware.[1][6] |
| .003 | 命令与脚本解释器: Windows Command Shell |
Indrik Spider has used batch scripts on victim's machines.[1][5] |
||
| .007 | 命令与脚本解释器: JavaScript |
Indrik Spider has used malicious JavaScript files for several components of their attack.[6] |
||
| Enterprise | T1484 | .001 | 域或租户策略修改: Group Policy Modification |
Indrik Spider has used Group Policy Objects to deploy batch scripts.[1][5] |
| Enterprise | T1584 | .004 | 基础设施妥协: Server |
Indrik Spider has served fake updates via legitimate websites that have been compromised.[1] |
| Enterprise | T1562 | .001 | 妨碍防御: Disable or Modify Tools |
Indrik Spider used PsExec to leverage Windows Defender to disable scanning of all downloaded files and to restrict real-time monitoring.[6] Indrik Spider has used |
| Enterprise | T1585 | .002 | 建立账户: Email Accounts |
Indrik Spider has created email accounts to communicate with their ransomware victims, to include providing payment and decryption details.[1] |
| Enterprise | T1587 | .001 | 开发能力: Malware |
Indrik Spider has developed malware for their operations, including ransomware such as BitPaymer and WastedLocker.[1] |
| Enterprise | T1003 | .001 | 操作系统凭证转储: LSASS Memory |
Indrik Spider used Cobalt Strike to carry out credential dumping using ProcDump.[6] |
| Enterprise | T1590 | 收集受害者网络信息 |
Indrik Spider has downloaded tools, such as the Advanced Port Scanner utility and Lansweeper, to conduct internal reconnaissance of the victim network. Indrik Spider has also accessed the victim’s VMware VCenter, which had information about host configuration, clusters, etc.[5] |
|
| Enterprise | T1074 | .001 | 数据分段: Local Data Staging |
Indrik Spider has stored collected data in a .tmp file.[6] |
| Enterprise | T1486 | 数据加密以实现影响 |
Indrik Spider has encrypted domain-controlled systems using BitPaymer.[1] Additionally, Indrik Spider used PsExec to execute a ransomware script.[5] |
|
| Enterprise | T1078 | 有效账户 |
Indrik Spider has used valid accounts for initial access and lateral movement.[5] Indrik Spider has also maintained access to the victim environment through the VPN infrastructure.[5] |
|
| .002 | Domain Accounts |
Indrik Spider has collected credentials from infected systems, including domain accounts.[1] |
||
| Enterprise | T1489 | 服务停止 |
Indrik Spider has used PsExec to stop services prior to the execution of ransomware.[6] |
|
| Enterprise | T1552 | .001 | 未加密凭证: Credentials In Files |
Indrik Spider has searched files to obtain and exfiltrate credentials.[5] |
| Enterprise | T1012 | 查询注册表 |
Indrik Spider has used a service account to extract copies of the |
|
| Enterprise | T1204 | .002 | 用户执行: Malicious File |
Indrik Spider has attempted to get users to click on a malicious zipped file.[6] |
| Enterprise | T1070 | .001 | 移除指标: Clear Windows Event Logs |
Indrik Spider has used Cobalt Strike to empty log files.[6] Additionally, Indrik Spider has cleared all event logs using |
| Enterprise | T1558 | .003 | 窃取或伪造Kerberos票据: Kerberoasting |
Indrik Spider has conducted Kerberoasting attacks using a module from GitHub.[5] |
| Enterprise | T1007 | 系统服务发现 |
Indrik Spider has used the win32_service WMI class to retrieve a list of services from the system.[6] |
|
| Enterprise | T1583 | 获取基础设施 |
Indrik Spider has purchased access to victim VPNs to facilitate access to victim environments.[5] |
|
| Enterprise | T1105 | 输入工具传输 |
Indrik Spider has downloaded additional scripts, malware, and tools onto a compromised host.[1][6][5] |
|
| Enterprise | T1021 | .001 | 远程服务: Remote Desktop Protocol |
Indrik Spider has used RDP for lateral movement.[5] |
| .004 | 远程服务: SSH |
Indrik Spider has used SSH for lateral movement.[5] |
||
| Enterprise | T1018 | 远程系统发现 |
Indrik Spider has used PowerView to enumerate all Windows Server, Windows Server 2003, and Windows 7 instances in the Active Directory database.[6] |
|
| Enterprise | T1567 | .002 | 通过网络服务渗出: Exfiltration to Cloud Storage |
Indrik Spider has exfiltrated data using Rclone or MEGASync prior to deploying ransomware.[5] |