ShadowSyndicate infrastructure Used by Multiple ransomware Groups Including Cl0p, LockBit and RansomHub

ShadowSyndicate infrastructure Used by Multiple ransomware Groups Including Cl0p, LockBit and RansomHub

Cybersecurity researchers have uncovered significant overlaps between the attack infrastructure of ShadowSyndicate, also known as Infra Storm by Group-IB, and several prominent ransomware-as-a-service (RaaS) operations.

Active since July 2022, ShadowSyndicate has been linked to high-profile RaaS brands such as AlphaV/BlackCat, LockBit, Play, Royal, Cl0p, Cactus, and RansomHub.

The group, speculated to function more as a RaaS affiliate than a pure initial access broker (IAB), shares tactical, technical, and procedural (TTP) similarities with intrusion sets like TrickBot, Ryuk/Conti, FIN7, and TrueBot (Silence.Downloader), which are associated with Russian cyberespionage actors like Evil Corp, potentially directed by the FSB for operations against NATO allies.

The probe began with two scanning IP addresses (91.238.181[.]225 and 5.188.86[.]169) that exhibited a common Secure Shell (SSH) fingerprint (b5:4c:ce:68:9e:91:39:e8:24:b6:e5:1a:84:a7:a1:03), expanding to 138 servers via tools like Shodan and Fofa.

This fingerprint aligns with a TTP previously reported by Group-IB in September 2023, enabling persistent tracking of the group’s resilient infrastructure.

Overlaps with Top-Tier Ransomware Ecosystems

Moderate overlaps were identified with LockBit 3.0’s Citrix Bleed (CVE-2023-4966) exploitation campaign from October 2023, where affiliates deployed LockBit and ThreeAM ransomware.

ShadowSyndicate
C&C endpoints of the MSI file

Approximately 40 IP addresses intersected, including Cobalt Strike beacons on servers like 147.78.47[.]226 and 147.78.47[.]231, tied to watermarks linking to UAC-0056 (Cadet Blizzard, GRU-affiliated) and Cl0p operations exploiting MOVEit vulnerabilities.

Further connections emerged with Cicada3301, a potential rebrand of BlackCat/ALPHV, sharing exfiltration servers and exploiting ScreenConnect flaws (CVE-2024-1708/1709), alongside Black Basta and Bl00dy ransomware.

Infrastructure ties also extended to state-sponsored advanced persistent threats (APTs), including Chinese actors via ToneShell backdoor variants and North Korean groups like Andariel (Onyx Sleet) using RustDoor and Maui ransomware.

ShadowSyndicate infrastructure Used by Multiple ransomware Groups Including Cl0p, LockBit and RansomHub

Overlaps with infostealers such as Atomic (AMOS) and Poseidon, distributed via fake Google Ads and DeepSeek LLM lures, suggest ShadowSyndicate’s role in broader cybercrime ecosystems, potentially facilitating access for APTs through brute-force botnets like Brutus.

Network of Bulletproof Hosters

According to the report, Researchers assess with moderate confidence that ShadowSyndicate accesses a network of private bulletproof hosting providers (BPHs) in Europe, exhibiting traits of intelligence agency hosting (IAH), operated from Russia via offshore entities in Panama, Seychelles, and the U.S. Virgin Islands.

These BPHs, disguised as VPS, VPN, or proxy services, ensure takedown resilience through imbricated autonomous system numbers (ASNs) like AS209588 (Flyservers S.A.), AS209132 (Alviva Holding Limited), and AS-Tamatiya (encompassing 22 ASNs).

Links to Kremlin interests, including oligarchs like Mikhail Slipenchuk, underscore potential state alignment.

Low-confidence ties to foreign information manipulation and interference (FIMI) operations, such as the Hunter Biden laptop leak via hunterlap.top, aimed at influencing the 2024 U.S. presidential elections, highlight hybrid threats blending cybercrime with geopolitical disruption.

The infrastructure also intersects with DecoyDog (PupyRAT over DNS tunneling) and campaigns involving Amadey loaders and Nitol malware. As of May 2025, the network remains active, scanning for vulnerabilities and deploying payloads.

ShadowSyndicate’s innovator-level sophistication, leveraging zero-days and organization-scale resources, positions it as a hybrid IAB fueling Russian, North Korean, and possibly Chinese APTs, echoing battlefield alliances in Ukraine.

Indicators of Compromise (IOCs)

Value Type Description
47890 ASN UNMANAGED LTD
215540 ASN GLOBAL CONNECTIVITY SOLUTIONS LLP
209272 ASN Alviva Holding Limited
209132 ASN Alviva Holding Limited
59580 ASN Batterflyai Media ltd.
273045 ASN DataHome S.A.
57043 ASN HOSTKEY B.V.
50867 ASN HOSTKEY B.V.
49453 ASN Global layer B.V.
43350 ASN NForce Entertainment B.V.
AS-TAMATIYA AS-SET 22 ASNs (old, created in 2014)
AS-4VENDETA AS-SET 22 ASNs (new AS-SET cloned from AS-TAMATIYA created in early 2021)
88.214.25.246 IPv4-Addr Secure Shell (SSH) fingerprint of ShadowSyndicate (extracted from FOFA the 2nd May 2025)
147.78.46.104 IPv4-Addr Secure Shell (SSH) fingerprint of ShadowSyndicate (extracted from FOFA the 2nd May 2025)
193.142.30.96 IPv4-Addr Secure Shell (SSH) fingerprint of ShadowSyndicate (extracted from FOFA the 2nd May 2025)
200.107.207.13 IPv4-Addr Secure Shell (SSH) fingerprint of ShadowSyndicate (extracted from FOFA the 2nd May 2025)

Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates!


Source link