Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Matrix Botnet

DragonForce – Threat Actor

January 25, 2025
Reading Time: 3 mins read
in Threat Actors
DragonForce – Threat Actor

DragonForce

Location

Malaysia

Date of initial activity

2021

Suspected Attribution 

Hacktivists

Government Affiliation

No

Motivation

Hacktivism

Software

Linux

Overview

DragonForce Malaysia, a prominent pro-Palestinian hacktivist group based in Malaysia, has emerged as a formidable force in the realm of cyber activism. Known for their strategic and politically motivated cyber operations, DragonForce Malaysia has distinguished itself by aligning with various threat groups such as the T3 Dimension Team and ReliksCrew. The group’s digital footprint spans several platforms, including a dedicated website, a forum for discussions, and active presence on social media channels like Twitter, LinkedIn, and Telegram. This multifaceted approach not only amplifies their reach but also underscores their adaptability in the fast-evolving landscape of cyber warfare. Established as a significant player in the hacktivist community, DragonForce Malaysia has conducted several high-impact campaigns targeting government agencies and organizations across the Middle East and Asia. Notable operations include #OpsBedil, #OpsBedilReloaded, #OpsRWM (Raids Without Mercy), and #OpsPatuk/#OpsIndia. These campaigns highlight the group’s commitment to leveraging digital tools to further their ideological objectives, often employing tactics such as denial-of-service (DoS) attacks and website defacements. Their ability to coordinate and execute such campaigns underscores their operational expertise and the strategic nature of their actions.

Common targets

  • Israel
  • Russia
  • India – Information
  • Public Administration

Attack vectors

Software Vulnerabilities

How they operate

At the core of DragonForce Malaysia’s operations are their denial-of-service (DoS) attacks and website defacements. The group utilizes a range of DoS attack vectors to overwhelm and incapacitate targeted web services and online platforms. These attacks often involve Distributed Denial-of-Service (DDoS) techniques, where the group harnesses large botnets or compromised devices to flood a target with an excessive volume of traffic. This method effectively disrupts the normal operation of the targeted systems, rendering them inaccessible to legitimate users. The technical execution of such attacks requires a deep understanding of network protocols and the ability to manage substantial attack infrastructure. In addition to DoS attacks, DragonForce Malaysia is proficient in website defacement. This technique involves altering the appearance of a targeted website to convey a political message or propaganda. The process typically involves exploiting vulnerabilities in web servers or content management systems to gain unauthorized access. Once access is achieved, the group can modify the site’s HTML, CSS, and JavaScript files to display their own messages. The technical skills required for successful defacement include knowledge of web application vulnerabilities, such as SQL injection or cross-site scripting (XSS), and the ability to exploit these weaknesses effectively. DragonForce Malaysia has demonstrated a notable capacity to leverage newly disclosed vulnerabilities quickly. This involves monitoring cybersecurity forums, vulnerability databases, and threat intelligence sources to identify the latest security flaws. Upon discovering a new exploit, the group integrates it into their operations to enhance their attack capabilities. This proactive approach highlights their technical agility and ability to adapt to emerging threats. The rapid adoption of new exploits requires not only technical expertise but also a robust internal communication system to disseminate information and coordinate responses effectively. The group’s operational infrastructure includes various digital platforms, such as their website, forums, and social media channels. These platforms are used for recruiting members, coordinating attacks, and disseminating propaganda. Their Telegram channel and presence on other social media sites enable them to mobilize supporters and execute campaigns with greater efficiency. The integration of these platforms into their operational strategy illustrates a sophisticated understanding of digital communication and its role in modern hacktivism. DragonForce Malaysia’s technical operations reflect a blend of classic hacking techniques and modern cybersecurity practices. Their ability to execute large-scale DoS attacks, perform website defacements, and quickly adapt to new vulnerabilities underscores their technical proficiency and strategic approach. As cyber threats continue to evolve, DragonForce Malaysia’s operations serve as a testament to the complexity and adaptability required in contemporary cyber activism. Understanding their methods provides valuable insights into the tactics employed by hacktivist groups and highlights the ongoing need for robust cybersecurity defenses.
References:
  • DragonForce Malaysia
Tags: DOSDragonForceIndiaIsraelMalaysiaPalestineReliksCrewRussiaThreat ActorsTwitter
ADVERTISEMENT

Related Posts

Storm-1811 (Cybercriminal) – Threat Actor

Storm-1811 (Cybercriminal) – Threat Actor

March 2, 2025
CopyCop (State-Sponsored) – Threat Actor

CopyCop (State-Sponsored) – Threat Actor

March 2, 2025
Storm-0539 – Threat Actor

Storm-0539 – Threat Actor

March 2, 2025
Void Manticore (Storm-0842) – Threat Actor

Void Manticore (Storm-0842) – Threat Actor

March 2, 2025
Unfading Sea Haze – Threat Actor

Unfading Sea Haze – Threat Actor

March 2, 2025
Ikaruz Red Team – Threat Actor

Ikaruz Red Team – Threat Actor

March 2, 2025

Latest Alerts

New ZeroCrumb Malware Steals Browser Cookies

TikTok Videos Spread Vidar StealC Malware

CISA Commvault ZeroDay Flaw Risks Secrets

GitLab Patch Stops Service Disruption Risks

3AM Ransomware Email Bomb and Vishing Threat

Function Confusion Hits Serverless Clouds

Subscribe to our newsletter

    Latest Incidents

    Cetus Crypto Exchange Hacked For $223M

    MCP Data Breach Hits 235K NC Lab Patients

    UFCW Data Breach Risks Social Security Data

    Cyberattack Paralyzes French Hauts de Seine

    Santa Fe City Loses $324K In Hacker Scam

    Belgium Housing Hit by Ransomware Attack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial