DragonForce Unleashes Chaos: Ransomware Cartel Spares Russia, Fuels Global Cyber Frenzy

DragonForce, a ransomware-as-a-service operation, is making waves with its rebranding as a “cartel” and warning affiliates not to target Russia or Commonwealth of Independent States. Despite these claims, researchers can’t confirm DragonForce’s Russian origins, adding a twist to this cybercrime saga.

Pro Dashboard

Hot Take:

DragonForce has decided to add a little fire-breathing flair to the ransomware world, but they’re playing a game of cat and mouse with international cyber sleuths. While they’re rolling out the red carpet for affiliates, they’re simultaneously trying to dodge accusations of being in cahoots with Russian intelligence. Is it a clever marketing strategy or just smoke and mirrors? Either way, it’s shaping up to be quite the cyber soap opera!

Key Points:

  • DragonForce, a ransomware-as-a-service operation, started gaining traction in 2024.
  • The FBI has tagged DragonForce as one of 2024’s most prolific ransomware sources.
  • DragonForce claims 158 victims and has been linked to attacks on retailers like Marks & Spencer, Co-op, and Harrods.
  • The gang avoids attacking organizations in Russia and the Commonwealth of Independent States.
  • Speculations arise about DragonForce’s possible connections to Russian intelligence.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?