ShadowSyndicate | |
Other Names | Infra Storm |
Location | Unknown |
Date of initial activity | 2022 |
Suspected attribution | Unknown |
Associated Groups | With a strong degree of confidence: Quantum, Nokoyawa, ALPHV. With a low degree of confidence: Royal, Cl0p, Cactus, and Play ransomware Group. Group-IB said it also found additional infrastructure overlaps that connect ShadowSyndicate to TrickBot, Ryuk/Conti, FIN7, and TrueBot |
Motivation | Financial gain |
Associated tools | Cobalt Strike, Silver, IcedID, Matanbuchus, Meterpreter. |
Active | Yes |
Overview
In July 2022, ShadowSyndicate was uncovered utilizing at least seven distinct ransomware families, including Royal, Cl0p, Cactus, and Play. This Ransomware-as-a-Service (RaaS) entity employs a diverse array of tools for its operations, such as Cobalt Strike, Sliver, IcedID, Matanbuchus, and Meterpreter, enabling advanced penetration testing, banking Trojan functionality, and backdoor access.
Furthermore, their infrastructure was found to have ties with Cl0p/Truebot, indicating a broader network of cybercriminal activity. ShadowSyndicate’s involvement extends beyond ransomware, with connections to Quantum ransomware in September 2022, Nokoyawa ransomware in October & November 2022 and March 2023, and ALPHV activity in February 2023. This underscores the group’s versatility and breadth within the cyber threat landscape.
Common targets
Individuals and organizations worldwide.
Attack Vectors
ShadowSyndicate’s alliances suggest a degree of sophistication and coordination, underscoring the actor’s potential to exert influence and cause damage within the broader threat landscape.
How they operate
The threat actor uses the same Secure Shell (SSH) fingerprint on many servers. The SSH fingerprint 1ca4cbac895fc3bd12417b77fc6ed31d, which is connected to various potentially malicious servers, was detected by multiple researchers. It was deployed on 85 IP servers and most of them (at least 52) were tagged as Cobalt Strike C2, from July 2022 to September 2023.
Researchers have noted that ShadowSyndicate’s servers are not all owned by the same entity. This information eliminates the possibility that ShadowSyndicate is a hoster who set up the SSH fingerprint on their server, as previously hypothesized. Upon further investigation, it was discovered that there are 18 distinct server owners involved.
A majority of the servers (23) are located in Panama, followed by Cyprus (11), Russia (9), Seychelles (8), Costa Rica (7), Czechia (7), Belize (6), Bulgaria (3), Honduras (3), and the Netherlands (3).
“Out of the 149 IP addresses that we linked to Cl0p ransomware affiliates, we have seen, since August 2022, 12 IP addresses from 4 different clusters changed ownership to ShadowSyndicate, which suggests that there is some potential sharing of infrastructure between these groups,” the researchers said.
In its attacks, ShadowSyndicate used an “off-the-shelf” toolkit, including Cobalt Strike, IcedID, and Sliver malware.
In the ransomware ecosystem, affiliates are the hackers that break into organizations and deploy a ransomware program in exchange for a large part of the ransom that victims pay. The ransomware developers usually provide the malware builder and infrastructure such as the data leak site and the ransom negotiation site. They also handle the negotiation with victims and take care of the payment infrastructure. However, they don’t do the hacking and malware deployment themselves.
“Although we have not reached a final verdict, all the facts obtained during this joint research project suggest that the most plausible assumption is that ShadowSyndicate is an affiliate working with various RaaS,” the researchers said.
References:
- Dusting for fingerprints: ShadowSyndicate, a new RaaS player?
- Hackers exploit Aiohttp bug to find vulnerable networks