Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Ransomware Group

ShadowSyndicate – Threat Actor

March 18, 2024
Reading Time: 3 mins read
in Ransomware Group, Threat Actors
ShadowSyndicate – Threat Actor
 

ShadowSyndicate

Other Names

Infra Storm

Location

Unknown

Date of initial activity

2022

Suspected attribution

Unknown

Associated Groups

With a strong degree of confidence: Quantum, Nokoyawa, ALPHV. With a low degree of confidence: Royal, Cl0p, Cactus, and Play ransomware Group. Group-IB said it also found additional infrastructure overlaps that connect ShadowSyndicate to TrickBot, Ryuk/Conti, FIN7, and TrueBot

Motivation

Financial gain

Associated tools

Cobalt Strike, Silver, IcedID, Matanbuchus, Meterpreter.

Active

Yes

Overview

In July 2022, ShadowSyndicate was uncovered utilizing at least seven distinct ransomware families, including Royal, Cl0p, Cactus, and Play. This Ransomware-as-a-Service (RaaS) entity employs a diverse array of tools for its operations, such as Cobalt Strike, Sliver, IcedID, Matanbuchus, and Meterpreter, enabling advanced penetration testing, banking Trojan functionality, and backdoor access. Furthermore, their infrastructure was found to have ties with Cl0p/Truebot, indicating a broader network of cybercriminal activity. ShadowSyndicate’s involvement extends beyond ransomware, with connections to Quantum ransomware in September 2022, Nokoyawa ransomware in October & November 2022 and March 2023, and ALPHV activity in February 2023. This underscores the group’s versatility and breadth within the cyber threat landscape.

Common targets

Individuals and organizations worldwide.

Attack Vectors

ShadowSyndicate’s alliances suggest a degree of sophistication and coordination, underscoring the actor’s potential to exert influence and cause damage within the broader threat landscape.

How they operate

The threat actor uses the same Secure Shell (SSH) fingerprint on many servers. The SSH fingerprint 1ca4cbac895fc3bd12417b77fc6ed31d, which is connected to various potentially malicious servers, was detected by multiple researchers. It was deployed on 85 IP servers and most of them (at least 52) were tagged as Cobalt Strike C2, from July 2022 to September 2023. Researchers have noted that ShadowSyndicate’s servers are not all owned by the same entity. This information eliminates the possibility that ShadowSyndicate is a hoster who set up the SSH fingerprint on their server, as previously hypothesized. Upon further investigation, it was discovered that there are 18 distinct server owners involved. A majority of the servers (23) are located in Panama, followed by Cyprus (11), Russia (9), Seychelles (8), Costa Rica (7), Czechia (7), Belize (6), Bulgaria (3), Honduras (3), and the Netherlands (3). “Out of the 149 IP addresses that we linked to Cl0p ransomware affiliates, we have seen, since August 2022, 12 IP addresses from 4 different clusters changed ownership to ShadowSyndicate, which suggests that there is some potential sharing of infrastructure between these groups,” the researchers said. In its attacks, ShadowSyndicate used an “off-the-shelf” toolkit, including Cobalt Strike, IcedID, and Sliver malware. In the ransomware ecosystem, affiliates are the hackers that break into organizations and deploy a ransomware program in exchange for a large part of the ransom that victims pay. The ransomware developers usually provide the malware builder and infrastructure such as the data leak site and the ransom negotiation site. They also handle the negotiation with victims and take care of the payment infrastructure. However, they don’t do the hacking and malware deployment themselves. “Although we have not reached a final verdict, all the facts obtained during this joint research project suggest that the most plausible assumption is that ShadowSyndicate is an affiliate working with various RaaS,” the researchers said.
References:
  • Dusting for fingerprints: ShadowSyndicate, a new RaaS player?
  • Hackers exploit Aiohttp bug to find vulnerable networks
 
Tags: ALPHVAttackersBlackCatCactusClopCobalt StrikeIcedIDMatanbuchusMeterpreterNokoyawaPLAYQuantumRansomwareRansomware GroupRoyalShadowSyndicateSilverThreat Actors
ADVERTISEMENT

Related Posts

Storm-1811 (Cybercriminal) – Threat Actor

Storm-1811 (Cybercriminal) – Threat Actor

March 2, 2025
CopyCop (State-Sponsored) – Threat Actor

CopyCop (State-Sponsored) – Threat Actor

March 2, 2025
Storm-0539 – Threat Actor

Storm-0539 – Threat Actor

March 2, 2025
Void Manticore (Storm-0842) – Threat Actor

Void Manticore (Storm-0842) – Threat Actor

March 2, 2025
Unfading Sea Haze – Threat Actor

Unfading Sea Haze – Threat Actor

March 2, 2025
Ikaruz Red Team – Threat Actor

Ikaruz Red Team – Threat Actor

March 2, 2025

Latest Alerts

New ZeroCrumb Malware Steals Browser Cookies

TikTok Videos Spread Vidar StealC Malware

CISA Commvault ZeroDay Flaw Risks Secrets

GitLab Patch Stops Service Disruption Risks

3AM Ransomware Email Bomb and Vishing Threat

Function Confusion Hits Serverless Clouds

Subscribe to our newsletter

    Latest Incidents

    Cetus Crypto Exchange Hacked For $223M

    MCP Data Breach Hits 235K NC Lab Patients

    UFCW Data Breach Risks Social Security Data

    Cyberattack Paralyzes French Hauts de Seine

    Santa Fe City Loses $324K In Hacker Scam

    Belgium Housing Hit by Ransomware Attack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial