Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

DragonForce Cartel Emerges From the Leaked Source Code of Conti v3 Ransomware

Posted on November 5, 2025November 5, 2025 By CWS

DragonForce, a ransomware-as-a-service operation lively since 2023, has dramatically advanced into what researchers now describe as a structured cybercriminal cartel, leveraging the publicly leaked Conti v3 supply code to determine a formidable risk infrastructure.

The group initially relied on the LockBit 3.0 builder for growing encryptors earlier than transitioning to a custom-made Conti v3 codebase, giving it vital operational benefits and technical capabilities that rival established ransomware operations.

The transition marked a turning level in DragonForce’s evolution. Fairly than working as a standard ransomware group, the group rebranded itself as a cartel in early 2025, essentially altering the way it conducts enterprise.

This shift allows associates to white-label payloads and create their very own branded variants whereas sustaining operational independence beneath DragonForce’s infrastructure umbrella.

By providing associates 80 % of earnings, the cartel construction removes technical limitations to entry and incentivizes recruitment of recent operators.

The group now gives complete instruments together with automated deployment techniques, customizable encryptors, dependable infrastructure with 24/7 monitoring, and assist for a number of platforms spanning Home windows, ESXi, Linux, BSD, and NAS techniques.

Acronis researchers and risk analysts recognized that DragonForce employs refined assault methodologies alongside Scattered Spider, a financially motivated preliminary entry dealer specializing in social engineering and multi-factor authentication bypass ways.

Execution chain (Supply – Acronis)

Scattered Spider conducts reconnaissance on course staff by means of social media and open-source intelligence, crafting convincing pretexts to orchestrate phishing campaigns and voice phishing assaults.

As soon as credentials are compromised, the group deploys distant monitoring instruments like ScreenConnect and AnyDesk to determine persistence, then conducts intensive community reconnaissance specializing in backup infrastructure, credential repositories, and VMware environments.

Superior Encryption Mechanisms and Technical Refinement

DragonForce’s technical sophistication distinguishes it from competing operations.

The malware employs ChaCha20 encryption for configuration recordsdata and generates distinctive encryption keys for every focused file.

Notably, after safety researchers disclosed encryption weaknesses in Akira ransomware by means of a Habr article, DragonForce promptly strengthened its personal cipher implementation, demonstrating lively risk intelligence monitoring and fast technical adaptation.

The group implements a number of encryption modes together with full, header, and partial encryption, with configurable thresholds figuring out encryption methods for particular person recordsdata.

A very regarding approach includes BYOVD assaults using susceptible drivers like truesight.sys and rentdrv2.sys to terminate safety software program and guarded processes.

The malware communicates with these drivers by means of DeviceIoControl capabilities utilizing particular management codes, successfully bypassing endpoint detection and response options.

Configuration parameters reveal refined operational planning, with focused course of termination lists together with SQL Server situations, Oracle databases, and Microsoft productiveness purposes to maximise encryption success charges.

Since late 2023, DragonForce has uncovered greater than 200 victims throughout retail, airways, insurance coverage, managed service suppliers, and enterprise sectors.

The Marks & Spencer assault, attributed to Scattered Spider and DragonForce collaboration, exemplifies the operational effectiveness of their partnership.

As DragonForce continues recruiting associates and establishing market dominance by means of infrastructure takeovers focusing on rival teams, the cartel mannequin represents a regarding evolution in ransomware operations.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Cartel, Code, Conti, DragonForce, Emerges, Leaked, Ransomware, Source

Post navigation

Previous Post: Mysterious ‘SmudgedSerpent’ Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions
Next Post: CISA Warns of Control Web Panel OS Command Injection Vulnerability Exploited in Attacks

Related Posts

Microsoft Probes Leak in Early Alert System as Chinese Hackers Exploit SharePoint Vulnerabilities Cyber Security News
Microsoft Reveals Techniques To Defending Against Advancing AiTM Attacks Cyber Security News
Linux Legitimate System Behaviours Weaponized to Harvest Secrets from Shared Environments Cyber Security News
Multiple 0-days to Bypass BitLocker and Extract All Protected Data Cyber Security News
Multiple Vulnerabilities in Tridium Niagara Framework Cyber Security News
Hackers Can Bypass OpenAI Guardrails Framework Using a Simple Prompt Injection Technique Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly
  • Curly COMrades Hacker Group Using New Tools to Create Hidden Remote Access on Compromised Windows 10
  • Malware Now Uses AI During Execution to Mutate and Collect Data, Google Warns
  • FIN7 Hackers Using Windows SSH Backdoor to Establish Stealthy Remote Access and Persistence
  • Webinar Today: Scattered Spider Exposed – Critical Takeaways for Cyber Defenders

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly
  • Curly COMrades Hacker Group Using New Tools to Create Hidden Remote Access on Compromised Windows 10
  • Malware Now Uses AI During Execution to Mutate and Collect Data, Google Warns
  • FIN7 Hackers Using Windows SSH Backdoor to Establish Stealthy Remote Access and Persistence
  • Webinar Today: Scattered Spider Exposed – Critical Takeaways for Cyber Defenders

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News