The cyber threat landscape is constantly evolving, with new actors and tactics emerging to challenge security defenses. Among the most notable entities in recent times are ShadowSyndicate and RansomHub, both of which have made significant impacts through their sophisticated operations and strategic collaborations. The rapid growth and adaptability of these two groups are causing major concerns for cybersecurity experts as they attempt to keep up with the changing paradigms of ransomware threats.
The Rise of ShadowSyndicate
ShadowSyndicate, also known as Infra Storm, has been a prominent player since its emergence in July 2022. Known for its collaborations with various ransomware groups, ShadowSyndicate has affiliations with ransomware programs like Quantum, Nokoyawa, and ALPHV. They employ a range of tools, including Cobalt Strike, Sliver, IcedID, and Matanbuchus malware, to execute their attacks. This versatility in their toolkit allows them to carry out a wide array of highly effective and devastating attacks on their targets.
One of the notable patterns associated with ShadowSyndicate is the repeated use of the same SSH fingerprint on their servers. These servers have been linked to Cobalt Strike command and control (C2) frameworks, indicating a sophisticated level of operational consistency. This consistency allows for easier identification and tracking of their activities by cybersecurity professionals. ShadowSyndicate’s meticulous approach to maintaining their infrastructure ensures that their operations can continue with minimal interruption, further cementing their reputation as a formidable threat in the cyber landscape.
Emergence of RansomHub
RansomHub gained prominence following the FBI’s takedown of the ALPHV/BlackCat ransomware group in December 2023. As a Ransomware-as-a-Service (RaaS) operator, RansomHub quickly attracted affiliates, especially after the disruption of the LockBit group in February 2024. Their aggressive recruitment strategies on underground forums enabled them to absorb ex-ALPHV and ex-LockBit affiliates, significantly boosting their activity levels. By offering a lucrative platform for new and existing cybercriminals, RansomHub has managed to rise rapidly in the ranks of ransomware operators.
By 2024, RansomHub reported around 500 victims on their Dedicated Leak Site (DLS). This rapid growth can be attributed to their attractive financial incentives, offering affiliates up to 90% of the ransom, much higher than the industry standard of 70-80%. This high return rate has made RansomHub a preferred choice for many ransomware affiliates. The combination of effective recruitment and appealing financial rewards has solidified RansomHub’s position as a significant player in the ransomware ecosystem.
Convergence of ShadowSyndicate and RansomHub
There is a reported convergence between ShadowSyndicate and RansomHub, with ShadowSyndicate leveraging RansomHub’s resources. This partnership likely resulted from the higher return rates offered by RansomHub. ShadowSyndicate has been observed performing attacks involving RansomHub ransomware, particularly in September and October 2024. This collaboration highlights the strategic shift by ShadowSyndicate to maximize financial gains through RansomHub’s platform.
In these attacks, ransom notes formatted as “README_[a-zA-Z0-9]{6}.txt” threatened to release stolen data unless a ransom was paid. Data exfiltration was consistently noted, directed towards servers previously associated with ShadowSyndicate. This convergence of resources and expertise underscores the evolving nature of ransomware operations and the increasing sophistication of threat actors working together to maximize their output and disruption. The strategic moves by these groups present significant challenges for cybersecurity professionals tasked with defending against such attacks.
Attack Techniques and Patterns
Darktrace’s research has investigated ShadowSyndicate’s utilization of RansomHub ransomware, noting incidents affecting sectors like education, manufacturing, and social services. The attack chain frequently begins with internal reconnaissance, involving network scans and port enumerations via key ports such as 22, 445, and 3389. These steps facilitate internal mapping and identification of exploitable points, paving the way for C2 communications and eventual data exfiltration. This meticulous planning and execution showcase the advanced skills and tactics employed by these threat actors to compromise their targets effectively.
One consistent observation in cases involving RansomHub is the brief and unusual connection to endpoints tied to Splashtop, a remote desktop software, before identifying outbound SSH connections to malicious endpoints such as 46.161.27[.]151, linked to ShadowSyndicate’s C2 infrastructure. Data exfiltration mechanisms include using WinSCP for secure file transfer, HTTP connections to MEGA cloud storage using the ‘rclone’ user agent, and SSL port 443 connections for secure transfers. These meticulously executed steps ensure that stolen data can be securely transmitted to the attackers without detection.
Lateral Movement and File Encryption
Lateral movement within the network typically follows C2 communications, involving new administrative credentials and executable file transfers under cryptic file names. Additionally, batch scripts indicating attempts to bypass network defenses were also identified. File encryption activities observed in three cases showed that filenames were appended with extensions fitting the pattern “.[a-zA-Z0-9]{6}”. This structured approach to lateral movement and file encryption demonstrates the high level of organization and planning of these ransomware groups.
Ransom notes followed a similar pattern, with threats of data leakage if ransoms were not met and provided TOR links for victims to negotiate. Despite the absence of Darktrace’s Autonomous Response capability at the time of the ransomware attacks, their Cyber AI Analyst provided detailed coverage of the attack kill chain, enabling rapid identification and remediation of compromised devices. These detailed analyses are crucial in understanding the intricacies of the attacks and developing effective countermeasures against future threats.
Implications for Cybersecurity
The cyber threat landscape is always shifting, with new actors and techniques regularly introduced to challenge security measures. Recently, two groups, ShadowSyndicate and RansomHub, have become particularly notable for their advanced operations and strategic partnerships. ShadowSyndicate is known for its stealthy tactics and highly coordinated attacks, which often result in significant data breaches and financial losses for organizations. They excel at finding vulnerabilities within systems, making them a formidable adversary for cybersecurity professionals.
On the other hand, RansomHub has made waves by employing aggressive ransomware strategies, encrypting victims’ data and demanding hefty ransoms for its release. Their ability to continually adapt and evolve their methodologies makes them a persistent threat, capable of bypassing even the most robust security protocols. The collaboration between these two groups has intensified the challenges faced by cybersecurity teams, as they now must defend against a blend of techniques and tactics that are harder to predict and counteract.
As cybersecurity experts scramble to stay ahead, the rapid growth and adaptability of ShadowSyndicate and RansomHub are major causes for concern. Maintaining up-to-date defenses and focusing on comprehensive threat intelligence are more crucial than ever. Those defending against these sophisticated cyber threats must remain vigilant, continuously upgrading their strategies to combat these ever-evolving adversaries. The cybersecurity landscape will undoubtedly continue to change, and staying one step ahead of these cybercriminals is now a relentless pursuit.