Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Researchers Breakdown DragonForce Ransomware Along with Decryptor for ESXi and Windows Systems

Posted on January 14, 2026January 14, 2026 By CWS

DragonForce is the most recent ransomware model to maneuver from noisy discussion board posts to full RaaS operations, focusing on each Home windows and VMware ESXi environments.

First seen in December 2023 on BreachForums, the group advertises stolen knowledge and makes use of a darkish net weblog to stress victims. The early leak put up revealed the brand new cartel-style operation.

The group constructed its payload from leaked LockBit 3.0 and Conti code, however tuned it for versatile, high-speed encryption throughout native disks and community shares.

Operators normally achieve entry by way of uncovered distant desktop servers, then use instruments like Cobalt Strike and SystemBC to maneuver laterally earlier than launching the ransomware. Impression ranges from encrypted file servers and digital machines to stolen knowledge ready for public launch.

Publish uploaded to BreachForums (Supply – Medium)

S2W analysts recognized a customized DragonForce construct that hides practically all strings with a home-grown deobfuscation routine and depends on ChaCha8 plus RSA-4096 for file encryption.

Their analysis exhibits that command-line flags let associates select native, network-only, or blended modes, and even tune partial encryption ratios to hurry up assaults. Whereas its DLS exhibits the inner workflow from configuration decryption to course of killing and file scrambling.

DragonForce’s DLS as of December 2023 (Supply – Medium)

Throughout wider menace searching, S2W researchers obtained a working decryptor for each Home windows and ESXi programs, giving some victims a path to restoration with out paying ransom.

The Home windows device seems to be for recordsdata with the .RNP extension, whereas the ESXi model checks for .RNP_esxi recordsdata that additionally finish with a selected eight-byte magic worth known as build_key. Moreover this it maps the total decryption chain from RSA key loading to metadata parsing and file restoration.

DragonForce — we invite you to affix our household (Supply – Medium)

This entire technical breakdown offers defenders perception into DragonForce instruments and restoration choices.

Encryption and Decryption Workflow

On execution, the ransomware first decrypts its inner configuration utilizing ChaCha8, then reads choices reminiscent of encryption mode and goal path.

Publish asserting the migration of the RansomHub infrastructure to DragonForce (Supply – Medium)

A typical command seen by S2W analysts is dragonforce.exe -m internet -p C: -j 8, which tells the malware to hit community targets beneath that path with a number of employee threads.

DragonForce Ransomware Execution Movement (Supply – Medium)

Because it scans native and distant paths, DragonForce skips core system areas, then encrypts chosen recordsdata. For giant digital disk photographs it encrypts solely chunks as a substitute of the entire file to save lots of time.

On the finish of every file it writes 534 bytes of metadata with an RSA-encrypted ChaCha8 key and nonce plus flags that retailer mode, ratio, and unique dimension.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Breakdown, Decryptor, DragonForce, ESXi, Ransomware, Researchers, Systems, Windows

Post navigation

Previous Post: New One-Click Microsoft Copilot Vulnerability Grants Attackers Undetected Access to Sensitive Data
Next Post: Aikido Security Raises $60 Million at $1 Billion Valuation

Related Posts

How Anat Heilper Orchestrates Breakthroughs In Silicon And Software Cyber Security News
Windows 11 24H2/25H2 Update Blocks Mouse and Keyboard in Recovery Mode Cyber Security News
Threat Actors Using Fake Travel Websites to Infect Users’ PCs with XWorm Malware Cyber Security News
Sidewinder APT Hackers Leverage Nepal Protests to Push Mobile and Windows Malware Cyber Security News
BlackLock Ransomware Attacking Windows, Linux, and VMware ESXi Environments Cyber Security News
MongoDB Server Pre-Authentication Vulnerability Let Attackers Trigger DoS Condition Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Stealthy CastleLoader Malware Attacking US-Based Government Entities
  • Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers
  • Aikido Security Raises $60 Million at $1 Billion Valuation
  • Researchers Breakdown DragonForce Ransomware Along with Decryptor for ESXi and Windows Systems
  • New One-Click Microsoft Copilot Vulnerability Grants Attackers Undetected Access to Sensitive Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Stealthy CastleLoader Malware Attacking US-Based Government Entities
  • Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers
  • Aikido Security Raises $60 Million at $1 Billion Valuation
  • Researchers Breakdown DragonForce Ransomware Along with Decryptor for ESXi and Windows Systems
  • New One-Click Microsoft Copilot Vulnerability Grants Attackers Undetected Access to Sensitive Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark