Threat Actor Profile

Salty Spider Threat Actor Profile

Salty Spider, also associated with the Sality malware and botnet, is a financially motivated eCrime group that has been active since 2003. Operating primarily from Russia, this group employs polymorphic file infectors and peer-to-peer propagation to infect systems globally. They are known for their large-scale botnet campaigns, cryptocurrency theft, cryptojacking, and occasional politically motivated cyberattacks.

Threat Actor Profile

Salty Spider Threat Actor Profile

Country of Origin

Salty Spider is believed to operate out of the Russian Federation, with specific activity traced to the Republic of Bashkortostan. While no official confirmation exists, their alignment and activity patterns strongly suggest this origin.

Members

The exact size of Salty Spider is unknown. Due to their reliance on botnets and decentralized infrastructure, the group effectively operates as a distributed network of compromised machines rather than a traditional hierarchical entity. It remains challenging to attribute specific aliases or identities to members.

Leadership

There is no publicly known leadership associated with Salty Spider. Due to their decentralized operations and use of peer-to-peer systems, their organizational structure remains opaque, aligning with broader eCrime group trends.

Salty Spider TTPs

Tactics

Salty Spider focuses on large-scale infections and the exploitation of compromised systems. Their primary tactics center on creating and maintaining a robust botnet capable of delivering secondary payloads for financial gain.

Techniques

The group employs polymorphic file infectors to evade detection and uses peer-to-peer propagation to expand their reach. They monetize infections by stealing cryptocurrency, hijacking clipboard data, and deploying cryptojacking malware. Occasionally, they conduct DDoS attacks, adding a political or hacktivist flavor to their operations.

Procedures

Following an initial infection via altered legitimate executables, Salty Spider spreads malware through P2P networks, shared drives, and infected binaries. Once inside a system, they deploy secondary malware targeting cryptocurrency wallets or enabling mining operations. They also utilize frequent code changes to avoid detection and hamper removal efforts.

Want to Shut Down Threats Before They Start?

Notable Cyberattacks

One notable attack occurred in February 2022, when Salty Spider conducted DDoS campaigns against Ukrainian web forums discussing the war in Kharkiv. While their primary focus remains financial, this incident demonstrated their potential for politically driven activities.

Law Enforcement & Arrests

There are no confirmed law enforcement actions against Salty Spider or its members as of now. Their decentralized structure and use of P2P techniques complicate attribution and takedown efforts.

How to Defend Against

1

File Integrity Monitoring: Inspect legitimate executable files for unexpected modifications.

2

Network Traffic Analysis: Monitor for unusual P2P traffic or connections to suspicious C2 servers.

3

Patch Management: Regularly update software to reduce vulnerabilities.

4

Antivirus with Heuristics: Use solutions capable of detecting polymorphic behavior.

5

Clipboard Protection: Educate users on cryptocurrency wallet safety and implement protections against clipboard hijacking.

6

DDoS Mitigation: Employ anti-DDoS tools for public-facing platforms.

Huntress Managed Endpoint Detection and Response can help safeguard your organization from the threats posed by Salty Spider. Huntress tools detect and neutralize polymorphic file infectors, offer actionable intelligence for threat mitigation, and monitor unusual network behaviors to stop Salty Spider in its tracks. Take proactive steps today to fortify your defenses against this sophisticated cybercrime group.


Detect, Respond, Protect

See how the global Huntress SOC can augment your team
with 24/7 coverage and unmatched human expertise.
Start your free trial today.

Try Huntress for Free