Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
DragonForce Ransomware Group – The Rise of a Relentless Cyber Threat in 2025

DragonForce Ransomware Group – The Rise of a Relentless Cyber Threat in 2025

Posted on June 12, 2025June 12, 2025 By CWS

The cybersecurity panorama has witnessed the emergence of more and more subtle ransomware operations, with DragonForce standing out as a very regarding risk actor that has advanced from politically motivated assaults to large-scale monetary extortion campaigns.

DragonForce ransomware group launched in 2023 as a politically motivated collective, initially focusing on entities that aligned with particular ideological beliefs.

Nevertheless, the group has undergone a major transformation, pivoting towards financially motivated extortion campaigns which have positioned it as one of many extra distinguished ransomware-as-a-service operations lively as we speak.

The group’s evolution displays the broader development of cybercriminal organizations adapting their methods to maximise profitability whereas increasing their operational attain.

Intel 471 analysts recognized that the group operates below what it phrases a “cartel” operation mannequin, whereby actors might create their very own “model” and launch assaults utilizing DragonForce’s infrastructure, instruments, and sources, together with entry to their knowledge leak website.

Question logic (Supply – Intel471)

This method differs barely from conventional RaaS fashions by permitting associates to undertake their very own names fairly than working solely below the DragonForce banner.

The group’s assaults have been documented globally, significantly affecting high-profile targets throughout the retail, monetary, and manufacturing sectors in North America, Europe, and Asia.

The group’s operational methodology facilities round a dual-extortion technique the place attackers encrypt victims’ knowledge whereas concurrently threatening to launch exfiltrated data if ransom calls for aren’t met.

Reasonably than creating proprietary encryption instruments, DragonForce has leveraged leaked ransomware builders from established teams together with LockBit and Conti, demonstrating the interconnected nature of contemporary cybercriminal ecosystems.

Intel 471 researchers have tracked 53 attainable victims of DragonForce all through 2025, highlighting the group’s sustained operational tempo.

Notable incidents linked to DragonForce embrace knowledge breaches affecting main UK retailers Marks & Spencer and Co-op, which precipitated extreme operational disruptions.

These assaults have been attributed to native English-speaking attackers suspected of being DragonForce associates, probably related to the broader TheCom on-line ecosystem, also referred to as Scattered Spider.

Persistence Techniques and Registry Manipulation

DragonForce employs subtle persistence mechanisms to take care of entry to compromised methods, with registry run key modification representing a cornerstone of their operational methodology.

Home windows Occasion Logs ingested into Splunk (Supply – Intel471)

After preliminary system compromise, the group implements persistence methods that guarantee their malware executes robotically upon system restart, successfully sustaining entry even when defenders try to remediate different assault vectors.

The group’s persistence technique entails including malicious packages to startup folders or referencing them by Home windows registry run keys, permitting referenced packages to execute robotically when customers log in.

This system permits sustained entry with out requiring person interplay or repeated social engineering efforts, representing a crucial element of their post-exploitation actions.

Automate risk response with ANY.RUN’s TI Feeds—Enrich alerts and block malicious IPs throughout all endpoints -> Request full entry

Cyber Security News Tags:Cyber, DragonForce, Group, Ransomware, Relentless, Rise, Threat

Post navigation

Previous Post: Paragon ‘Graphite’ Spyware Linked to Zero-Click Hacks on Newest iPhones
Next Post: Cloudflare Warns of DDoS Attacks Targeting Journalists and News Organizations

Related Posts

Toys “R” Us Canada Confirms Data Breach Toys “R” Us Canada Confirms Data Breach Cyber Security News
American Airlines Subsidiary Envoy Compromised in Oracle Hacking Campaign American Airlines Subsidiary Envoy Compromised in Oracle Hacking Campaign Cyber Security News
Sweet Security Named Cloud Security Leader and CADR Leader in Latio Cloud Security Report Sweet Security Named Cloud Security Leader and CADR Leader in Latio Cloud Security Report Cyber Security News
New Android Malware ‘Fantasy Hub’ Intercepts SMS Messages, Contacts and Call Logs New Android Malware ‘Fantasy Hub’ Intercepts SMS Messages, Contacts and Call Logs Cyber Security News
ValleyRAT Malware Uses Fake LINE Installer to Steal Data ValleyRAT Malware Uses Fake LINE Installer to Steal Data Cyber Security News
Resilient Tycoon2FA Phishing Platform Bounces Back Rapidly Resilient Tycoon2FA Phishing Platform Bounces Back Rapidly Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark