Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

DragonForce Uses Modified Ransomware Tools

September 25, 2024
Reading Time: 2 mins read
in Alerts

The cybercriminal group DragonForce has been launching attacks across industries worldwide, targeting sectors such as manufacturing, real estate, and transportation. According to researchers from Group-IB, DragonForce has been using modified versions of two infamous ransomware variants: LockBit and Conti. The malware used by DragonForce is based on leaked ransomware builders, allowing the group to tailor these tools to their specific needs. LockBit, Conti, and other ransomware families like Babuk are commonly reused and adapted by modern ransomware operators, reflecting a growing trend of cybercriminals leveraging existing ransomware frameworks for new attacks.

DragonForce operates as a ransomware-as-a-service group, selecting affiliates who are experienced in carrying out high-value cyberattacks. These affiliates are offered 80% of the ransom payments in exchange for executing attacks using the group’s customized tools. They are also given the flexibility to adjust various aspects of the ransomware, such as encryption parameters and ransom notes, to suit the target. This approach has allowed DragonForce to scale its operations, making it a significant threat to various organizations globally.

In addition to the ransomware itself, DragonForce employs a double extortion strategy, which involves not only encrypting a victim’s data but also exfiltrating sensitive information with the threat of making it public. This tactic adds considerable pressure on victims, who face the risk of reputational damage, financial loss, and compromised business continuity if the stolen data is leaked. This combination of encryption and data theft is a key element of DragonForce’s attack methodology, amplifying the urgency for victims to pay the ransom to prevent further damage.

Over the past year, Group-IB has tracked DragonForce’s attacks on 82 victims, primarily in the U.S., U.K., and Australia. Some of the group’s notable past targets include Yakult Australia, the Ohio Lottery, and the government of Palau. While Group-IB has not attributed the attacks to any specific country or individuals, there have been previous hints suggesting that DragonForce could be based in Malaysia. The group’s use of sophisticated tools, including the SystemBC backdoor, Mimikatz, and Cobalt Strike, underscores its formidable capabilities in targeting key industries and carrying out complex cyberattacks.

 

Reference:

  • Inside the Dragon: DragonForce Ransomware Group

Tags: ContiCyber AlertsCyber Alerts 2024Cyber threatsDragonForceLockBitMalwaremanufacturingRansomwareReal EstateSeptember 2024Transportation
ADVERTISEMENT

Related Posts

Fortinet And Ivanti Patch Severe Flaws

October 16, 2025

Malicious VSCode Extensions Steal Crypto

October 16, 2025

Fake Password Manager Hijack PCs

October 16, 2025
Android Flaw Lets Apps Steal 2FA Codes

Android Flaw Lets Apps Steal 2FA Codes

October 15, 2025
Android Flaw Lets Apps Steal 2FA Codes

New Sap Netweaver Bug Enables Takeover

October 15, 2025
Two New Windows Zero Days Exploited

Two New Windows Zero Days Exploited

October 15, 2025

Latest Alerts

Fortinet And Ivanti Patch Severe Flaws

Malicious VSCode Extensions Steal Crypto

Fake Password Manager Hijack PCs

Android Flaw Lets Apps Steal 2FA Codes

New Sap Netweaver Bug Enables Takeover

Two New Windows Zero Days Exploited

Subscribe to our newsletter

    Latest Incidents

    F5 Reports Hackers Stole Source Code

    YouTube Down Globally With Playback Errors

    Spanish Retailer Mango Discloses Breach

    Unencrypted Satellites Expose Data

    Sonicwall VPN Accounts Breached

    Microsoft Investigates 365 App Outage

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial