Pinchy Spider, Gold Southfield

Description

(CrowdStrike) CrowdStrike Intelligence has recently observed Pinchy Spider affiliates deploying GandCrab ransomware in enterprise environments, using lateral movement techniques and tooling commonly associated with nation-state adversary groups and penetration testing teams. This change in tactics makes Pinchy Spider and its affiliates the latest eCrime adversaries to join the growing trend of targeted, low-volume/high-return ransomware deployments known as “big game hunting.”

Pinchy Spider is the criminal group behind the development of the ransomware most commonly known as GandCrab, which has been active since January 2018. Pinchy Spider sells access to use GandCrab ransomware under a partnership program with a limited number of accounts. The program is operated with a 60-40 split in profits (60 percent to the customer), as is common among eCrime actors, but Pinchy Spider is also willing to negotiate up to a 70-30 split for “sophisticated” customers.

GandCrab and Sodinokibi have been observed to be distributed by DanaBot (operated by Scully Spider, TA547) and Taurus Loader (operated by Venom Spider, Golden Chickens).

Names

NameName-Giver
Pinchy SpiderCrowdStrike
Gold SouthfieldSecureWorks
Gold GardenSecureWorks

Country

Motivation

  • Financial gain

First Seen

2018

Observed Countries

Tools

Operations

Counter Operations

Information

Mitre Attack

Other Information

Uuid

bdd28842-178b-4258-a37f-5c1c1bb71bb2

Last Card Change

2024-12-26