DragonForce Unleashes Chaos: Ransomware Cartel Spares Russia, Fuels Global Cyber Frenzy
DragonForce, a ransomware-as-a-service operation, is making waves with its rebranding as a “cartel” and warning affiliates not to target Russia or Commonwealth of Independent States. Despite these claims, researchers can’t confirm DragonForce’s Russian origins, adding a twist to this cybercrime saga.

Hot Take:
DragonForce has decided to add a little fire-breathing flair to the ransomware world, but they’re playing a game of cat and mouse with international cyber sleuths. While they’re rolling out the red carpet for affiliates, they’re simultaneously trying to dodge accusations of being in cahoots with Russian intelligence. Is it a clever marketing strategy or just smoke and mirrors? Either way, it’s shaping up to be quite the cyber soap opera!
Key Points:
- DragonForce, a ransomware-as-a-service operation, started gaining traction in 2024.
- The FBI has tagged DragonForce as one of 2024’s most prolific ransomware sources.
- DragonForce claims 158 victims and has been linked to attacks on retailers like Marks & Spencer, Co-op, and Harrods.
- The gang avoids attacking organizations in Russia and the Commonwealth of Independent States.
- Speculations arise about DragonForce’s possible connections to Russian intelligence.
Already a member? Log in here