Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

DragonForce Ransomware Claimed To Compromise Over 120 Victims in The Past Year

Posted on June 6, 2025June 6, 2025 By CWS

DragonForce, a complicated ransomware operation that emerged in fall 2023, has established itself as a formidable menace within the cybercriminal panorama by claiming over 120 victims throughout the previous yr.

In contrast to conventional ransomware-as-a-service fashions, this menace actor has developed into what safety consultants time period a “ransomware cartel,” essentially altering how cybercriminal operations are structured and executed.

The group has demonstrated exceptional adaptability, initially working with ransomware that shared traits with LockBit 3.0 earlier than transitioning to a Conti variant throughout summer time 2024.

DragonForce has strategically focused organizations throughout numerous sectors together with manufacturing, development, expertise, healthcare, and retail, with victims spanning the USA, Italy, and Australia.

Their ransom calls for replicate subtle sufferer analysis, starting from lots of of 1000’s to tens of millions of {dollars}, with one documented case demanding $7 million from a compromised group.

Bitdefender researchers recognized DragonForce’s distinctive operational mannequin, which distinguishes it from standard ransomware teams by way of its cartel-like construction and infrastructure provision companies.

The group gives associates an unprecedented 80% revenue share whereas offering complete operational help together with weblog administration, file servers, admin panels, 24/7 monitoring, and petabytes of storage capability.

This method permits DragonForce to keep up management over allied teams’ sources whereas eliminating potential rivals.

The menace actor has demonstrated regarding geopolitical connections, using Russian-linked infrastructure and dealing with accusations from RansomHub members of associating with the FSB.

Their operational sophistication extends to their knowledge leak web site, which options sufferer listings, stolen knowledge previews, and countdown timers for publication deadlines.

DragonForce banner (Supply – Bitdefender)

Latest actions recommend DragonForce could also be consolidating energy inside the ransomware ecosystem, probably compromising rival teams together with LockBit.

Superior Evasion and Encryption Capabilities

DragonForce employs subtle technical mechanisms that allow persistent entry and complete system compromise.

The group exploits a number of essential vulnerabilities together with CVE-2024-21412, CVE-2024-21887, and CVE-2024-21893 to determine preliminary footholds in goal networks.

Their persistence technique closely depends on Residing Off the Land strategies, leveraging official executables comparable to Schtasks.exe and Taskkill.exe to keep up entry whereas avoiding detection.

The ransomware’s encryption capabilities span a number of platforms with specialised variants for Home windows, Linux, ESXi, BSD, and NAS programs.

Their encryptors help numerous encryption modes together with band-pass, share, header, and regular encryption, with multithreading capabilities for enhanced efficiency.

Upon profitable execution, the malware appends .dragonforce_encrypted extensions to compromised information.

The group has integrated classes from earlier ransomware operations, notably relating to GPU cluster decryption strategies, to strengthen their encryption algorithms and file restoration prevention mechanisms throughout completely different working programs.

Pace up and enrich menace investigations with Risk Intelligence Lookup! -> 50 trial search requests

Cyber Security News Tags:Claimed, Compromise, DragonForce, Ransomware, Victims, Year

Post navigation

Previous Post: Beware of Fake AI Business Tools That Hides Ransomware
Next Post: New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently

Related Posts

Recurring Supply‑Chain Lapses Expose UEFI Firmware to Pre‑OS Threats Cyber Security News
Critical Adobe Illustrator Vulnerability Let Attackers Execute Malicious Code Cyber Security News
New Vulnerability Affects All Intel Processors From The Last 6 Years Cyber Security News
Kali GPT- AI Assistant That Transforms Penetration Testing on Kali Linux Cyber Security News
Chrome Vulnerabilities Let Attackers Execute Malicious Code Remotely Cyber Security News
Securing Legacy Systems Strategies for Modernizing Old Tech Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Kali GPT- AI Assistant That Transforms Penetration Testing on Kali Linux
  • New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Kali GPT- AI Assistant That Transforms Penetration Testing on Kali Linux
  • New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News