The threat landscape of 2025 is shaped not only by relentless malware but also by the emergence of new organizational models among cybercriminals.
One of the most notable developments is the rise of the DragonForce ransomware cartel a threat actor that has pivoted from traditional Ransomware-as-a-Service (RaaS) to a full-scale cartel, providing infrastructure and operational tools for affiliates.
Here, we explore the technical elements behind DragonForce’s success and its implications for defenders.
Ransomware Payload and Operational Modes
DragonForce started making headlines in late 2023, leveraging variants reminiscent of LockBit 3.0 but later evolving to use the Conti ransomware family. This group is known for their Windows encryptor, which supports:
Example of Ransomware Execution (Windows)
textdragonforce.exe --target "C:\SensitiveData" --mode full --encrypt-logs
The group’s ransomware is cross-platform, targeting Windows, Linux, and ESXi systems, with improvements inspired by public decryption research (notably Akira’s GPU-based decryptor). This flexibility ensures a wide attack surface in organizations running heterogeneous IT infrastructures.
Initial Access:
DragonForce operators typically gain initial footholds through:
Persistence:
Once inside, the group relies on “Living Off the Land” (LOTL) techniques to evade detection, commonly using:
Lateral Movement:
DragonForce abuses legitimate Remote Monitoring and Management (RMM) tools like SimpleHelp normally trusted by IT teams—to pivot across networks without raising alarms. The malware can also propagate through removable media.
Example PowerShell Persistence Command
powershellschtasks /create /tn "DFUpdater" /tr "powershell.exe -ExecutionPolicy Bypass -File C:\df_task.ps1" /sc onlogon /ru SYSTEM
Command and Control (C2):
Ingress Tool Transfer tactics are used to import additional tools, often leveraging FTP, Certutil.exe, or direct PowerShell download commands.
Data Exfiltration and Extortion Infrastructure
DragonForce maintains a robust data leak site (DLS), where they list victims, stolen data sizes, and countdowns to public disclosure. They have streamlined public access by removing CAPTCHAs, likely aiming to enhance visibility and pressure on victims.
The Cartel Model and Its Security Implications
Cartel Versus Classic RaaS
Unlike classic RaaS groups, DragonForce offers affiliates 80% of profits while supplying the technical backbone required to manage campaigns. This cartel-like structure empowers partners but also allows DragonForce to:
They have actively targeted competitors (e.g., defacing Mamona, attempting to absorb RansomHub’s affiliates), signaling a ruthless approach to market dominance.
SHA256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 recommend multi-layered security: patch management, network and endpoint protection, multi-factor authentication, continuous monitoring, and behavioral analysis to catch LOTL-based attacks.
Bitdefender’s GravityZone PHASR and IntelliZone are cited as examples of proactive defense tools.
The DragonForce cartel’s evolution marks a significant shift in ransomware economics and technical playbooks. Organizations must shift from reactive controls to resilient, intelligence-driven defense if they hope to withstand this new breed of cybercriminal cartel.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…