Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    We Used 5 Outlier Detection Strategies on a Actual Dataset: They Disagreed on 96% of Flagged Samples

    March 13, 2026

    Key Capabilities and Pricing Defined

    March 13, 2026

    Why Monitoring Issues In 2026

    March 13, 2026
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»DragonForce Ransomware Targets Essential Companies to Exfiltrate Delicate Knowledge
    AI Ethics & Regulation

    DragonForce Ransomware Targets Essential Companies to Exfiltrate Delicate Knowledge

    Declan MurphyBy Declan MurphyFebruary 5, 2026No Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    DragonForce Ransomware Targets Essential Companies to Exfiltrate Delicate Knowledge
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    DragonForce is a ransomware group that emerged in late 2023 and has grown right into a severe risk to companies by combining information theft with file encryption.

    The group makes use of twin extortion: it steals delicate information, encrypts methods, after which threatens to publish the stolen info on darkish internet leak websites if victims don’t pay.​

    DragonForce has focused a number of sectors, with a notable deal with manufacturing and building, and it has impacted high-profile organizations.

    The group has additionally proven it could adapt rapidly by refining its tooling and shifting from devoted sufferer websites to a centralized area for internet hosting leaked information.

    Cybereason notes this fast evolution helps hold DragonForce a persistent, rising threat worldwide.​

    RaaS platform and options

    DragonForce operates as a ransomware-as-a-service (RaaS) platform that helps associates run assaults throughout Home windows, Linux, ESXi, BSD, and NAS methods.

     DragonForce’s checklist of key options posted on a darkish internet discussion board (Supply : LevelBlue).

    The platform helps a number of encryption approaches (full, header, and partial encryption) and promotes automation for encryption, server administration, and assault execution.

    Reported options embody delayed-start choices, multithreading for velocity, detailed logging, and a “dry-run” mode that checks an assault movement with out really encrypting information.​

    For ESXi environments, Cybereason highlights command-line and configuration choices that management concentrating on and conduct, together with file-system search modes, delay timers, thread counts, logging settings, and permits for paths, extensions, filenames, and digital machines.

    These controls may help associates tailor impression (for instance, prioritizing VM infrastructure) whereas decreasing noisy failures that decelerate ransomware deployment.​

    Ransomware client builder  (Source : LevelBlue).
    Ransomware consumer builder (Supply : LevelBlue).

    DragonForce has introduced a strategic shift: associates can create their very own manufacturers underneath a “DragonForce ransomware cartel” umbrella and run their very own initiatives whereas nonetheless utilizing shared infrastructure and expertise.

    The group additionally launched an automatic registration service for brand new associates, decreasing prior friction like approval steps, deposits, and vetting.

    DragonForce has teased an upcoming product referred to as “DragonForce – Atom,” however didn’t publish technical particulars within the cited evaluation.​

    The identical reporting describes ecosystem “professionalization,” together with a “Firm Knowledge Audit” service meant to strengthen extortion by analyzing stolen information and producing negotiation supplies like threat studies, name scripts, and executive-facing letters.

    DragonForce has additionally engaged in public disputes with different ransomware operations, together with claims and counterclaims involving RansomHub and the defacement of a competitor’s leak web site.

    RansomHub publicly denied that it joined DragonForce (Source : LevelBlue).
     RansomHub publicly denied that it joined DragonForce (Supply : LevelBlue).

    Cybereason additional notes claims of a relationship between DragonForce Malaysia and the ransomware group stay unsubstantiated, and DragonForce Malaysia publicly denied affiliation in October 2025.​

    What defenders ought to do

    Cybereason noticed behaviors aligned with real-world ransomware playbooks, together with scanning SMB ports for reconnaissance and deleting Quantity Shadow Copies utilizing WMIC (for instance, wmic.exe shadowcopy the place “ID='{id}’” delete).

    Encrypted files (Source : LevelBlue).
    Encrypted information (Supply : LevelBlue).

    The evaluation states the Cybereason platform detected the DragonForce payload and blocked shadow-copy deletion and file encryption exercise.​

    Sensible steps advisable embody trying to find DragonForce affiliate pre-ransomware conduct, imposing MFA, sustaining sturdy patch administration, and making certain dependable backups and examined restore processes.

    If suspicious exercise is discovered, the steerage advises rapidly involving Incident Response to research, comprise, and take away the risk actor.

    For Cybereason Protection Platform customers, the report recommends enabling Anti-Malware, Anti-Ransomware (PRP) with shadow copy safety, Utility Management, and Variant Payload Prevention in stop mode.

    Observe us on Google Information, LinkedIn, and X to Get Instantaneous Updates and Set GBH as a Most popular Supply in Google.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    Why Monitoring Issues In 2026

    March 13, 2026

    Feds Dismantle SocksEscort Proxy Community Utilized in World Fraud

    March 13, 2026

    Why Stryker’s Outage Is a Catastrophe Restoration Wake-Up Name

    March 13, 2026
    Top Posts

    We Used 5 Outlier Detection Strategies on a Actual Dataset: They Disagreed on 96% of Flagged Samples

    March 13, 2026

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025
    Don't Miss

    We Used 5 Outlier Detection Strategies on a Actual Dataset: They Disagreed on 96% of Flagged Samples

    By Oliver ChambersMarch 13, 2026

    Picture by Writer   # Introduction   All tutorials on knowledge science make detecting outliers look…

    Key Capabilities and Pricing Defined

    March 13, 2026

    Why Monitoring Issues In 2026

    March 13, 2026

    Greatest Android Smartwatch for 2026

    March 13, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2026 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.