Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

DragonForce Cartel Emerges From the Leaked Source Code of Conti v3 Ransomware

Posted on November 5, 2025November 5, 2025 By CWS

DragonForce, a ransomware-as-a-service operation lively since 2023, has dramatically advanced into what researchers now describe as a structured cybercriminal cartel, leveraging the publicly leaked Conti v3 supply code to determine a formidable risk infrastructure.

The group initially relied on the LockBit 3.0 builder for growing encryptors earlier than transitioning to a custom-made Conti v3 codebase, giving it vital operational benefits and technical capabilities that rival established ransomware operations.

The transition marked a turning level in DragonForce’s evolution. Fairly than working as a standard ransomware group, the group rebranded itself as a cartel in early 2025, essentially altering the way it conducts enterprise.

This shift allows associates to white-label payloads and create their very own branded variants whereas sustaining operational independence beneath DragonForce’s infrastructure umbrella.

By providing associates 80 % of earnings, the cartel construction removes technical limitations to entry and incentivizes recruitment of recent operators.

The group now gives complete instruments together with automated deployment techniques, customizable encryptors, dependable infrastructure with 24/7 monitoring, and assist for a number of platforms spanning Home windows, ESXi, Linux, BSD, and NAS techniques.

Acronis researchers and risk analysts recognized that DragonForce employs refined assault methodologies alongside Scattered Spider, a financially motivated preliminary entry dealer specializing in social engineering and multi-factor authentication bypass ways.

Execution chain (Supply – Acronis)

Scattered Spider conducts reconnaissance on course staff by means of social media and open-source intelligence, crafting convincing pretexts to orchestrate phishing campaigns and voice phishing assaults.

As soon as credentials are compromised, the group deploys distant monitoring instruments like ScreenConnect and AnyDesk to determine persistence, then conducts intensive community reconnaissance specializing in backup infrastructure, credential repositories, and VMware environments.

Superior Encryption Mechanisms and Technical Refinement

DragonForce’s technical sophistication distinguishes it from competing operations.

The malware employs ChaCha20 encryption for configuration recordsdata and generates distinctive encryption keys for every focused file.

Notably, after safety researchers disclosed encryption weaknesses in Akira ransomware by means of a Habr article, DragonForce promptly strengthened its personal cipher implementation, demonstrating lively risk intelligence monitoring and fast technical adaptation.

The group implements a number of encryption modes together with full, header, and partial encryption, with configurable thresholds figuring out encryption methods for particular person recordsdata.

A very regarding approach includes BYOVD assaults using susceptible drivers like truesight.sys and rentdrv2.sys to terminate safety software program and guarded processes.

The malware communicates with these drivers by means of DeviceIoControl capabilities utilizing particular management codes, successfully bypassing endpoint detection and response options.

Configuration parameters reveal refined operational planning, with focused course of termination lists together with SQL Server situations, Oracle databases, and Microsoft productiveness purposes to maximise encryption success charges.

Since late 2023, DragonForce has uncovered greater than 200 victims throughout retail, airways, insurance coverage, managed service suppliers, and enterprise sectors.

The Marks & Spencer assault, attributed to Scattered Spider and DragonForce collaboration, exemplifies the operational effectiveness of their partnership.

As DragonForce continues recruiting associates and establishing market dominance by means of infrastructure takeovers focusing on rival teams, the cartel mannequin represents a regarding evolution in ransomware operations.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Cartel, Code, Conti, DragonForce, Emerges, Leaked, Ransomware, Source

Post navigation

Previous Post: Nikkei Says 17,000 Impacted by Data Breach Stemming From Slack Account Hack
Next Post: Daylight Raises $33 Million for AI-Powered MDR Platform

Related Posts

25 Controls, Mapped And Audit-Ready Cyber Security News
ChatGPT-5 Downgrade Attack Let Hackers Bypass AI Security With Just a Few Words Cyber Security News
Microsoft Fixes Windows 11 24H2 Audio Issue that Stops Bluetooth Headsets and Speakers Working Cyber Security News
Microsoft Confirms Windows 11 25H2 UI Features Broken Along With 24H2 Following Update Cyber Security News
New BRICKSTORM Stealthy Backdoor Attacking Tech and Legal Sectors Cyber Security News
Ukraine Hackers Attacking Russian Aerospace Companies and Other Defence-Related Sectors Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cybersecurity Weekly Recap – PornHub Breach, Cisco 0-Day, Amazon Detains DPRK IT Worker, and more
  • Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence
  • 100+ Cisco Secure Email Devices Exposed to Zero‑Day Exploited in the Wild
  • Claude Opus 4.5 Now Integrated with GitHub Copilot
  • Microsoft Rolls Out Baseline Security Mode for Office, SharePoint, Exchange, Teams, and Entra

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cybersecurity Weekly Recap – PornHub Breach, Cisco 0-Day, Amazon Detains DPRK IT Worker, and more
  • Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence
  • 100+ Cisco Secure Email Devices Exposed to Zero‑Day Exploited in the Wild
  • Claude Opus 4.5 Now Integrated with GitHub Copilot
  • Microsoft Rolls Out Baseline Security Mode for Office, SharePoint, Exchange, Teams, and Entra

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark