Writy.
No Result
View All Result
  • Home
  • Business & Finance
    • Global Markets & Economy
    • Entrepreneurship & Startups
    • Investment & Stocks
    • Corporate Strategy
    • Business Growth & Leadership
  • Health & Science
    • Digital Health & Telemedicine
    • Biotechnology & Pharma
    • Wellbeing & Lifestyl
    • Scientific Research & Innovation
  • Marketing & Growth
    • SEO & Digital Marketing
    • Branding & Public Relations
    • Social Media & Content Strategy
    • Advertising & Paid Media
  • Policy & Economy
    • Government Regulations & Policies
    • Economic Development
    • Global Trade & Geopolitics
  • Sustainability & Future Trends
    • Renewable Energy & Green Tech
    • Climate Change & Environmental Policies
    • Sustainable Business Practices
    • Future of Work & Smart Cities
  • Tech & AI
    • Artificial Intelligence & Automation
    • Software Development & Engineering
    • Cybersecurity & Data Privacy
    • Blockchain & Web3
    • Big Data & Cloud Computing
  • Home
  • Business & Finance
    • Global Markets & Economy
    • Entrepreneurship & Startups
    • Investment & Stocks
    • Corporate Strategy
    • Business Growth & Leadership
  • Health & Science
    • Digital Health & Telemedicine
    • Biotechnology & Pharma
    • Wellbeing & Lifestyl
    • Scientific Research & Innovation
  • Marketing & Growth
    • SEO & Digital Marketing
    • Branding & Public Relations
    • Social Media & Content Strategy
    • Advertising & Paid Media
  • Policy & Economy
    • Government Regulations & Policies
    • Economic Development
    • Global Trade & Geopolitics
  • Sustainability & Future Trends
    • Renewable Energy & Green Tech
    • Climate Change & Environmental Policies
    • Sustainable Business Practices
    • Future of Work & Smart Cities
  • Tech & AI
    • Artificial Intelligence & Automation
    • Software Development & Engineering
    • Cybersecurity & Data Privacy
    • Blockchain & Web3
    • Big Data & Cloud Computing
No Result
View All Result
DragonForce targets rivals in a play for dominance – Sophos Information

DragonForce targets rivals in a play for dominance – Sophos Information

Theautonewspaper.com by Theautonewspaper.com
25 May 2025
in Cybersecurity & Data Privacy
0
Share on FacebookShare on Twitter

You might also like

Danabot: Analyzing a fallen empire

Danabot: Analyzing a fallen empire

24 May 2025
BadSuccessor Exploits Home windows Server 2025 Flaw for Full AD Takeover

BadSuccessor Exploits Home windows Server 2025 Flaw for Full AD Takeover

24 May 2025


DragonForce is not only one other ransomware model – it’s a destabilizing drive making an attempt to reshape the ransomware panorama. Counter Risk Unit (CTU) researchers are actively monitoring the evolution of the menace posed by the group.  

Enter the dragon

DragonForce is concerned in high-impact assaults focusing on each conventional IT infrastructure and virtualized environments (e.g., VMware ESXi), with a robust emphasis on credential theft, Lively Listing abuse, and knowledge exfiltration. In March 2025, it launched efforts to assert dominance within the ransomware ecosystem by introducing a extra versatile affiliate mannequin and focusing on different ransomware teams. 

A collection of assaults on UK retailers that started in late April introduced this group into sharper focus as third-party stories linked these assaults to DragonForce and the GOLD HARVEST (also called Scattered Spider) menace group. GOLD HARVEST incessantly leverages social engineering, abuse of distant monitoring and administration (RMM) instruments, and multi-factor authentication (MFA) bypass methods to achieve entry, steal bulk knowledge, and typically deploy ransomware.  

When DragonForce emerged in August 2023, it provided a standard RaaS scheme. On March 19, 2025, the group introduced a rebrand as a ‘cartel’ to develop its attain, hoping to emulate the success of LockBit and different mature ransomware-as-a-service (RaaS) teams. In apply, it isn’t a cartel operation however an providing that offers associates the pliability to leverage DragonForce’s infrastructure and ransomware instruments whereas working below their very own manufacturers (see Determine 1). 

A screen capture of the 19 March 2025 announcement; the intro reads "Today I would like to present to you our new direction, we are starting to work in a new vein, according to a new principle. You no longer have to work under our brand, now you can create your own brand under the auspices of an already proven partner time! We the DragonForce Ransomware cartel present to you 'projects' now you create yourself."

Determine 1: Commercial for the DragonForce cartel

DragonForce didn’t simply revamp its enterprise mannequin; it started attacking rival operations. The ‘cartel’ submit coincided with defacements of leak websites operated by the BlackLock and Mamona ransomware teams. The defacements appeared to have been carried out by DragonForce, as seen within the side-by-side display captures in Determine 2. 

Two screens showing the BlackLock and Mamona defacements as described in text

Determine 2: Defaced Mamona (left) and BlackLock (proper) leak websites

In April, a submit on the RansomHub leak web site appeared to advertise the DragonForce cartel, as seen in Determine 3. A DragonForce submit on the RAMP underground discussion board additionally appeared to point that the teams have been working collectively, however the postscript recommended that RansomHub won’t help the collaboration (see Determine 4). RansomHub is likely one of the most prolific teams to emerge following the LockBit disruption and ALPHV (also called BlackCat) demise in 2024. 

A screen capture showing the DragonForce mention on RansomHub as described in text

Determine 3: DragonForce cartel point out on RansomHub leak web site

A screen capture showing the "collaboration" -- text reads "DragonForce & RansomHub -- Hi. Don't worry RansomHub will be up soon, they just decided to move to our infrastructure! We are reliable partners. A good example of how 'projects' work, a new option from The DragonForce Ransomware Cartel!" A postscript at the bottom reads "P.S. -- RansomHub hope you are doing well, consider our offer! We are waiting for everyone in our ranks."

Determine 4: DragonForce submit suggesting a collaboration with RansomHub

Shortly after these posts, the RansomHub leak web site went offline. The homepage displayed the message “RansomHub R.I.P 03/03/2025.” The “collaboration” between DragonForce and RansomHub seems to have been extra of a hostile takeover by DragonForce. The ‘koley’ persona, who is understood to be a distinguished RansomHub member, posted a defacement of the DragonForce homepage on RAMP (see Determine 5), together with the message “@dragonforce guess you could have traitors…” Further posts by koley accused DragonForce of working with legislation enforcement, attacking rivals, and telling lies.  

An image showing a crossed-out DragonForce logo and three derpy-looking cartoon dragons

Determine 5: Defacement of the DragonForce leak web site shared by RansomHub member ‘koley’

As of this publication, the DragonForce leak web site is again on-line after an prolonged interval of down time. Throughout that interval, the homepage displayed a message stating that it might be up once more quickly, and an analogous message seems on the RansomBay leak web site (see Determine 6). 

A pair of images; on the left, DragonForce announcement reads "We will be up soon -- Our blog and files server will be up on 29.04.2025 00:00 UTC Thank you for your patience." On the right, the RansomHub announcement reads "Went on a journey... We're still in search for a pirates!"

Determine 6: DragonForce and RansomBay leak web site homepages as of Could 2, 2025

In Could 2025, UK retailer Marks and Spencer was the topic of a big cyberattack that was publicly attributed to GOLD HARVEST (referred to within the reporting as Scattered Spider), though this attribution has not been formally confirmed. This group is a loosely organized cybercriminal collective made up of particular person menace actors who collaborate by means of a shared community of underground boards and encrypted chat channels utilized by a group of like-minded people often known as “The Com.” The menace actors on this group coordinate malicious companies to conduct assaults, alternate instruments, and share techniques inside this decentralized ecosystem. GOLD HARVEST reportedly deployed the DragonForce ransomware on this assault.  

GOLD HARVEST has been recognized to function as a ransomware affiliate, deploying ALPHV ransomware in assaults on MGM Resorts in 2023 and reportedly utilizing RansomHub in assaults all through 2024. The menace actors make the most of a variety of techniques, methods, and procedures (TTPs) of their assaults however are recognized for his or her efficient use of social engineering. They usually acquire entry to organizations by focusing on IT assist desks. Public attribution of the Marks and Spencer assault could also be predicated on the assumption that the assault began with social engineering, maybe focusing on assist desk workers. 

Social engineering is a common menace throughout the cyber panorama and isn’t distinctive to GOLD HARVEST, though the group has been adept at utilizing this method through electronic mail and phone calls. There’s growing interaction between social engineering and stolen credentials. GOLD HARVEST is recognized to make use of commodity infostealers similar to Vidar and Raccoon, which gather browser-saved passwords, cookies, and session tokens. These credentials can allow preliminary entry instantly or help extra convincing social engineering makes an attempt by permitting attackers to reference inner programs or mimic reputable worker conduct. 

DragonForce has claimed two assaults impacting UK retailers. These assaults spotlight the necessity for vigilance by corporations within the retail sector. The inner warfare amongst ransomware teams is disruptive to their very own operations however doesn’t cut back danger to organizations. In truth, it might result in extra erratic, opportunistic assaults as teams scramble to claim dominance and monetize stolen knowledge in new methods. Organizations should due to this fact revisit their incident response, menace intelligence, and third-party danger administration methods to stay resilient in an more and more chaotic menace surroundings. 

Suggestions for defenders

Whereas technical controls stay important for detecting and mitigating GOLD HARVEST and DragonForce exercise, they have to be bolstered by sturdy inner processes and constant human vigilance. These assaults reinforce that technical compromises usually start with social compromise. Conversations are incessantly the preliminary level of compromise, not exploits. Organizations should cut back their publicity to social engineering by combining technical controls with procedural self-discipline. CTU researchers advocate that organizations take the next actions to mitigate the dangers of those assaults: 

  • Deploy browser isolation and password managers to stop harvesting of saved credentials. 
  • Implement endpoint detection for infostealer exercise, together with credential and session cookie theft. 
  • Make the most of an identification monitoring resolution that makes use of darkish net sources and menace intel feeds to repeatedly monitor for compromised credentials. 
  • Implement strict identification verification protocols for IT help and assist desk interactions. 
  • Set up clear escalation paths to empower front-line workers to withstand uncommon or pressing requests till they are often verified. 
  • Conduct common tabletop workout routines that simulate social engineering and insider menace eventualities. 
Tags: dominanceDragonForceNewsPlayrivalsSophostargets
Theautonewspaper.com

Theautonewspaper.com

Related Stories

Danabot: Analyzing a fallen empire

Danabot: Analyzing a fallen empire

by Theautonewspaper.com
24 May 2025
0

As introduced by the US Division of Justice – the FBI and US DoD’s Protection Prison Investigative Service (DCIS) have...

BadSuccessor Exploits Home windows Server 2025 Flaw for Full AD Takeover

BadSuccessor Exploits Home windows Server 2025 Flaw for Full AD Takeover

by Theautonewspaper.com
24 May 2025
0

Akamai researchers reveal a essential flaw in Home windows Server 2025 dMSA function that enables attackers to compromise any Lively...

Streamlined administration – Sophos Information

Streamlined administration – Sophos Information

by Theautonewspaper.com
23 May 2025
0

As with each Sophos Firewall launch, v21.5 contains a number of quality-of-life enhancements that make day-to-day administration simpler. Watch this...

ESET APT Exercise Report This autumn 2024–Q1 2025: Key findings

ESET APT Exercise Report This autumn 2024–Q1 2025: Key findings

by Theautonewspaper.com
22 May 2025
0

ESET Chief Safety Evangelist Tony Anscombe highlights key findings from the most recent concern of the ESET APT Exercise Report...

Next Post
NVIDIA Proclaims DGX Cloud Lepton for GPU Entry throughout Multi-Cloud Platforms

AI Inference: NVIDIA Stories Blackwell Surpasses 1000 TPS/Person Barrier with Llama 4 Maverick

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

The Auto Newspaper

Welcome to The Auto Newspaper, a premier online destination for insightful content and in-depth analysis across a wide range of sectors. Our goal is to provide you with timely, relevant, and expert-driven articles that inform, educate, and inspire action in the ever-evolving world of business, technology, finance, and beyond.

Categories

  • Advertising & Paid Media
  • Artificial Intelligence & Automation
  • Big Data & Cloud Computing
  • Biotechnology & Pharma
  • Blockchain & Web3
  • Branding & Public Relations
  • Business & Finance
  • Business Growth & Leadership
  • Climate Change & Environmental Policies
  • Corporate Strategy
  • Cybersecurity & Data Privacy
  • Digital Health & Telemedicine
  • Economic Development
  • Entrepreneurship & Startups
  • Future of Work & Smart Cities
  • Global Markets & Economy
  • Global Trade & Geopolitics
  • Health & Science
  • Investment & Stocks
  • Marketing & Growth
  • Public Policy & Economy
  • Renewable Energy & Green Tech
  • Scientific Research & Innovation
  • SEO & Digital Marketing
  • Social Media & Content Strategy
  • Software Development & Engineering
  • Sustainability & Future Trends
  • Sustainable Business Practices
  • Technology & AI
  • Wellbeing & Lifestyl

Recent News

Fixing the AI & Crypto Information

Fixing the AI & Crypto Information

26 May 2025
California high-speed rail mission seeks outdoors traders

California high-speed rail mission seeks outdoors traders

26 May 2025
Hoopla Digital, in Collaboration with Era Media and Lumen Analysis, Unveils Business-First Consideration Measurement Mannequin for Kids’s Promoting

Kinetiq and NLogic Accomplice to Advance TV Advert Intelligence

26 May 2025
Studying easy methods to predict uncommon sorts of failures | MIT Information

Studying easy methods to predict uncommon sorts of failures | MIT Information

25 May 2025
Beneath the Line – The Hindu BusinessLine

Beneath the Line – The Hindu BusinessLine

25 May 2025
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://www.theautonewspaper.com/- All Rights Reserved

No Result
View All Result
  • Home
  • Business & Finance
    • Global Markets & Economy
    • Entrepreneurship & Startups
    • Investment & Stocks
    • Corporate Strategy
    • Business Growth & Leadership
  • Health & Science
    • Digital Health & Telemedicine
    • Biotechnology & Pharma
    • Wellbeing & Lifestyl
    • Scientific Research & Innovation
  • Marketing & Growth
    • SEO & Digital Marketing
    • Branding & Public Relations
    • Social Media & Content Strategy
    • Advertising & Paid Media
  • Policy & Economy
    • Government Regulations & Policies
    • Economic Development
    • Global Trade & Geopolitics
  • Sustainability & Future Trends
    • Renewable Energy & Green Tech
    • Climate Change & Environmental Policies
    • Sustainable Business Practices
    • Future of Work & Smart Cities
  • Tech & AI
    • Artificial Intelligence & Automation
    • Software Development & Engineering
    • Cybersecurity & Data Privacy
    • Blockchain & Web3
    • Big Data & Cloud Computing

© 2025 https://www.theautonewspaper.com/- All Rights Reserved