Threat Actor Profile
Solar Spider
Solar Spider is a financially motivated eCrime actor that loves to go phishing. Known for its targeted campaigns against banks and financial services, this group uses sophisticated social engineering and custom malware to get what it wants. Their signature tool is the JSOutProx remote access trojan (RAT), a nasty piece of JavaScript-based malware.
Threat Actor Profile
Solar Spider
Country of Origin
It's a bit murky. While most security researchers classify Solar Spider as a criminal enterprise focused on financial gain, some of its tooling and campaigns have fingerprints that point toward a China-nexus. However, there isn't a consensus that this group is operating under a nation-state direction. So, for now, the exact origin remains unconfirmed.
Members
The exact size and structure of Solar Spider are unknown. Public reporting doesn't agree on whether it's a single, organized group or a looser collection of actors all using the same JSOutProx toolkit. This ambiguity makes it tough to pin down just how many people are involved in their operations.
Leadership
Who's calling the shots? We don't know. No specific leaders or aliases have been publicly identified. Given the group's operational security and focus on financial crime, the leadership structure is likely kept under tight wraps to avoid drawing the wrong kind of attention from law enforcement.
Solar Spider TTPs
This group has a clear and effective playbook. They mix social engineering with custom tooling to bypass defenses and access sensitive financial systems.
Tactics
The primary goal is simple: money. Solar Spider's tactics are all geared toward financial fraud. This involves gaining initial access to a target's network, establishing persistent remote control, and then using that access to manipulate financial transactions or exfiltrate valuable data that can be monetized.
Techniques
How do they pull it off? Solar Spider relies heavily on fooling people. Their main techniques include:
Spearphishing: Crafting believable emails that trick employees into giving up credentials or running malicious code.
User Execution: Convincing a user to click on a malicious attachment or link, which kicks off the infection process.
Procedures
Here's a look at their go-to moves:
- Phishing Lures: They love faking payment notifications. Emails are often disguised as SWIFT messages or MoneyGram transfers to create a sense of urgency and legitimacy.
- Malware Delivery: Payloads are often delivered as JavaScript files or ZIP archives. They've also been caught abusing developer platforms like GitLab to host their malicious code, making it look like a legitimate download.
- Malware Execution: The attack chain typically involves a malicious JavaScript loader that executes .NET components, eventually deploying the full JSOutProx RAT. This modular RAT can load various plugins to steal data, execute commands, and maintain persistence.
Want to Shut Down Threats Before They Start?
Notable Cyberattacks
Solar Spider has been busy. Throughout 2024 and into 2025, security researchers have documented a steady stream of campaigns. A notable wave of attacks in early to mid-2024 saw a new and improved version of the JSOutProx RAT targeting banks in Saudi Arabia and other regions. These ongoing attacks show the group is actively refining its tools and expanding its reach.
Law Enforcement & Arrests
As of now, there have been no publicly announced arrests or law enforcement operations specifically targeting members of Solar Spider. Financially-motivated groups like this often operate across multiple jurisdictions, making attribution and prosecution a serious challenge.
How to Defend Against Solar Spider
Beef Up Email Security: Use advanced phishing filters and sandbox attachments and URLs. A little prevention here goes a long way.
Deploy Strong Endpoint Protection: You need an EDR solution that can spot the weird stuff, like JavaScript spawning .NET processes. Hunt for JSOutProx-related behaviors and artifacts.
Harden Your Tools: Monitor and restrict the use of public code repositories like GitLab for internal work. Alert on any suspicious activity from unknown accounts.
Lock Down Privileged Accounts: Enforce multi-factor authentication (MFA) everywhere you can. Apply the principle of least privilege, especially around accounts that can access payment and financial systems.
The Huntress Security Platform is built to stop threats like Solar Spider. Our Managed EDR, powered by a 24/7 Security Operation Center, detects the sneaky process anomalies and malicious scripts these actors rely on. We don't just send alerts; we investigate and provide the context you need to kick them out for good.
References
Detect, Respond, Protect
See how the global Huntress SOC can augment your team
with 24/7 coverage and unmatched human expertise.
Start your free trial today.