RansomHub, Ryuk and Black Basta: ShadowSyndicate Leverages Server Transition Technique in Latest Ransomware Attacks

RansomHub, Ryuk and Black Basta: ShadowSyndicate Leverages Server Transition Technique in Latest Ransomware Attacks

ShadowSyndicate Adopts Advanced Server Rotation Tactics to Evade Detection

In February 2026, cybersecurity researchers at Group-IB uncovered a sophisticated server transition technique employed by ShadowSyndicate, a cybercrime group first identified in 2023. The threat actor has refined its infrastructure management by rotating SSH fingerprints across multiple command-and-control (C2) servers, attempting to obscure operational continuity. Despite these efforts, operational security (OPSEC) lapses such as overlapping SSH keys allowed researchers to trace connections, revealing at least 20 active C2 servers linked to attack frameworks like Cobalt Strike, Metasploit, Havoc, Mythic, and Sliver.

ShadowSyndicate’s method involves transferring servers between SSH clusters to simulate legitimate ownership changes, creating plausible deniability. However, distinct patterns in SSH key usage exposed the group’s activities. Researchers confirmed two additional SSH fingerprints tied to the group in early 2026, further mapping its infrastructure.

The group’s operations are closely tied to multiple ransomware campaigns, including Cl0p/Truebot, ALPHV/BlackCat, Black Basta, Ryuk, and Malsmoke, with varying degrees of confidence. During RansomHub attacks in September–October 2024, Darktrace observed data exfiltration to ShadowSyndicate-associated servers via SSH, specifically linking the IP 46.161.27[.]151 to their C2 infrastructure. Another server (179.60.149[.]222) was found hosting MeshAgent alongside a known SSH fingerprint.

Analysts assess with moderate confidence that ShadowSyndicate operates as either an Initial Access Broker (IAB) or bulletproof hosting (BPH) provider, leveraging a network of private European providers with ties to Russian offshore entities. These providers disguise operations as VPN or proxy services, using layered autonomous system numbers (ASNs) like AS209588 and AS209132.

The group demonstrates a consistent preference for specific hosting providers, creating predictable attribution patterns despite attempts to diversify infrastructure. Their zero-day exploitation capabilities and organization-scale resources position them as a hybrid infrastructure provider, fueling both ransomware operations and potentially state-sponsored advanced persistent threats (APTs).

As of February 2026, ShadowSyndicate’s infrastructure remains active, continuing to scan for vulnerabilities and deploy malicious payloads.

Source: https://gbhackers.com/shadowsyndicate/

RansomHub TPRM report: https://www.rankiteo.com/company/flashpoint-intel

Ryuk TPRM report: https://www.rankiteo.com/company/ryuk-labs

Black Basta TPRM report: https://www.rankiteo.com/company/blackstone-group

"id": "ryublafla1770302429",
"linkid": "ryuk-labs, blackstone-group, flashpoint-intel",
"type": "Ransomware",
"date": "9/2024",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization's existence"
{'affected_entities': [{'location': ['Europe', 'Russian offshore entities'],
                        'type': ['Organizations targeted by ransomware',
                                 'Hosting providers']}],
 'attack_vector': ['SSH fingerprint rotation',
                   'Zero-day exploitation',
                   'C2 server infrastructure'],
 'data_breach': {'data_encryption': True,
                 'data_exfiltration': True,
                 'personally_identifiable_information': True,
                 'sensitivity_of_data': 'High',
                 'type_of_data_compromised': ['Personally identifiable '
                                              'information',
                                              'Payment information',
                                              'Corporate data']},
 'date_detected': '2026-02',
 'date_publicly_disclosed': '2026-02',
 'description': 'In February 2026, cybersecurity researchers at Group-IB '
                'uncovered a sophisticated server transition technique '
                'employed by ShadowSyndicate, a cybercrime group first '
                'identified in 2023. The threat actor refined its '
                'infrastructure management by rotating SSH fingerprints across '
                'multiple command-and-control (C2) servers to obscure '
                'operational continuity. Despite these efforts, operational '
                'security lapses such as overlapping SSH keys allowed '
                'researchers to trace connections, revealing at least 20 '
                'active C2 servers linked to attack frameworks like Cobalt '
                'Strike, Metasploit, Havoc, Mythic, and Sliver. The group’s '
                'operations are tied to multiple ransomware campaigns, '
                'including Cl0p/Truebot, ALPHV/BlackCat, Black Basta, Ryuk, '
                'and Malsmoke. ShadowSyndicate is assessed to operate as '
                'either an Initial Access Broker (IAB) or bulletproof hosting '
                'provider, leveraging a network of private European providers '
                'with ties to Russian offshore entities.',
 'impact': {'data_compromised': True,
            'identity_theft_risk': True,
            'operational_impact': 'Data exfiltration and ransomware deployment',
            'payment_information_risk': True,
            'systems_affected': ['C2 servers', 'Ransomware-affected systems']},
 'initial_access_broker': {'backdoors_established': True},
 'investigation_status': 'Ongoing',
 'lessons_learned': 'ShadowSyndicate’s advanced server rotation tactics '
                    'highlight the need for enhanced monitoring of SSH '
                    'fingerprint patterns and C2 server infrastructure to '
                    'detect threat actor continuity despite OPSEC efforts.',
 'motivation': ['Financial gain', 'Cybercrime infrastructure provision'],
 'post_incident_analysis': {'corrective_actions': ['Enhanced SSH fingerprint '
                                                   'monitoring',
                                                   'C2 server infrastructure '
                                                   'tracking'],
                            'root_causes': ['OPSEC lapses (overlapping SSH '
                                            'keys)',
                                            'Predictable hosting provider '
                                            'preferences']},
 'ransomware': {'data_encryption': True,
                'data_exfiltration': True,
                'ransomware_strain': ['Cl0p/Truebot',
                                      'ALPHV/BlackCat',
                                      'Black Basta',
                                      'Ryuk',
                                      'Malsmoke']},
 'recommendations': ['Implement enhanced monitoring for SSH fingerprint '
                     'anomalies.',
                     'Track C2 server infrastructure patterns to identify '
                     'threat actor continuity.',
                     'Strengthen defenses against zero-day exploits and '
                     'ransomware.',
                     'Collaborate with third-party cybersecurity firms for '
                     'threat intelligence sharing.'],
 'references': [{'date_accessed': '2026-02', 'source': 'Group-IB'},
                {'date_accessed': '2026-02', 'source': 'Darktrace'}],
 'response': {'enhanced_monitoring': True,
              'third_party_assistance': 'Group-IB, Darktrace'},
 'threat_actor': 'ShadowSyndicate',
 'title': 'ShadowSyndicate Adopts Advanced Server Rotation Tactics to Evade '
          'Detection',
 'type': ['Ransomware',
          'Initial Access Broker (IAB)',
          'Bulletproof Hosting (BPH)']}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.