Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

DragonForce Ransomware Group – The Rise of a Relentless Cyber Threat in 2025

Posted on June 12, 2025June 12, 2025 By CWS

The cybersecurity panorama has witnessed the emergence of more and more subtle ransomware operations, with DragonForce standing out as a very regarding risk actor that has advanced from politically motivated assaults to large-scale monetary extortion campaigns.

DragonForce ransomware group launched in 2023 as a politically motivated collective, initially focusing on entities that aligned with particular ideological beliefs.

Nevertheless, the group has undergone a major transformation, pivoting towards financially motivated extortion campaigns which have positioned it as one of many extra distinguished ransomware-as-a-service operations lively as we speak.

The group’s evolution displays the broader development of cybercriminal organizations adapting their methods to maximise profitability whereas increasing their operational attain.

Intel 471 analysts recognized that the group operates below what it phrases a “cartel” operation mannequin, whereby actors might create their very own “model” and launch assaults utilizing DragonForce’s infrastructure, instruments, and sources, together with entry to their knowledge leak website.

Question logic (Supply – Intel471)

This method differs barely from conventional RaaS fashions by permitting associates to undertake their very own names fairly than working solely below the DragonForce banner.

The group’s assaults have been documented globally, significantly affecting high-profile targets throughout the retail, monetary, and manufacturing sectors in North America, Europe, and Asia.

The group’s operational methodology facilities round a dual-extortion technique the place attackers encrypt victims’ knowledge whereas concurrently threatening to launch exfiltrated data if ransom calls for aren’t met.

Reasonably than creating proprietary encryption instruments, DragonForce has leveraged leaked ransomware builders from established teams together with LockBit and Conti, demonstrating the interconnected nature of contemporary cybercriminal ecosystems.

Intel 471 researchers have tracked 53 attainable victims of DragonForce all through 2025, highlighting the group’s sustained operational tempo.

Notable incidents linked to DragonForce embrace knowledge breaches affecting main UK retailers Marks & Spencer and Co-op, which precipitated extreme operational disruptions.

These assaults have been attributed to native English-speaking attackers suspected of being DragonForce associates, probably related to the broader TheCom on-line ecosystem, also referred to as Scattered Spider.

Persistence Techniques and Registry Manipulation

DragonForce employs subtle persistence mechanisms to take care of entry to compromised methods, with registry run key modification representing a cornerstone of their operational methodology.

Home windows Occasion Logs ingested into Splunk (Supply – Intel471)

After preliminary system compromise, the group implements persistence methods that guarantee their malware executes robotically upon system restart, successfully sustaining entry even when defenders try to remediate different assault vectors.

The group’s persistence technique entails including malicious packages to startup folders or referencing them by Home windows registry run keys, permitting referenced packages to execute robotically when customers log in.

This system permits sustained entry with out requiring person interplay or repeated social engineering efforts, representing a crucial element of their post-exploitation actions.

Automate risk response with ANY.RUN’s TI Feeds—Enrich alerts and block malicious IPs throughout all endpoints -> Request full entry

Cyber Security News Tags:Cyber, DragonForce, Group, Ransomware, Relentless, Rise, Threat

Post navigation

Previous Post: Paragon ‘Graphite’ Spyware Linked to Zero-Click Hacks on Newest iPhones
Next Post: Cloudflare Warns of DDoS Attacks Targeting Journalists and News Organizations

Related Posts

SentinelOne Global Service Outage Root Cause Revealed Cyber Security News
Microsoft 365 Authentication Issues Disrupt User Access Across Multiple Regions Cyber Security News
Building a Cyber-Resilient Organization in 2025 Cyber Security News
Google Threat Intelligence Launches Actionable Technique To Hunt for Malicious .Desktop Files Cyber Security News
Threat Actors Compromise 270+ Legitimate Websites With Malicious JavaScript Using JSFireTruck Obfuscation Cyber Security News
Securing the Cloud Best Practices for Multi-Cloud Environments Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China and Taiwan Accuse Each Other for Cyberattacks Against Critical Infrastructure
  • New Smartwatch Wi-Fi Injection, Android Radio and Hacking Tools
  • Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale
  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • In Other News: Cloudflare Outage, Cracked.io Users Identified, Victoria’s Secret Cyberattack Cost

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • China and Taiwan Accuse Each Other for Cyberattacks Against Critical Infrastructure
  • New Smartwatch Wi-Fi Injection, Android Radio and Hacking Tools
  • Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale
  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • In Other News: Cloudflare Outage, Cracked.io Users Identified, Victoria’s Secret Cyberattack Cost

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News