DragonForce Ransomware Attack Analysis – Targets, TTPs and IoCs | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware


DragonForce represents a sophisticated and rapidly evolving ransomware operation that has emerged as a significant threat in the cybersecurity landscape since late 2023.

Operating under a Ransomware-as-a-Service (RaaS) model, this group has demonstrated exceptional adaptability by leveraging leaked ransomware builders from notorious families like LockBit 3.0 and Conti to create customized attack variants.

The organization has successfully targeted high-profile victims across multiple sectors, including government entities, retail giants, and critical infrastructure, with notable attacks against the Ohio Lottery, Palau government, and major UK retailers like Marks & Spencer.


Google News

Their operations combine advanced technical capabilities with professional business practices, offering affiliates up to 80% of ransom payments while providing comprehensive attack infrastructure and support services.

Ransomware attack flow.
Ransomware attack flow. (Source: cybersecuritynews.com)

Introduction to DragonForce Ransomware

DragonForce first appeared in December 2023 with the launch of their “DragonLeaks” dark web portal, quickly establishing themselves as a formidable player in the ransomware ecosystem.

The group’s origins trace back to possible connections with DragonForce Malaysia, a hacktivist collective, though the current operation has evolved into a purely profit-driven enterprise.

By 2025, DragonForce has matured into a sophisticated RaaS platform that attracts both displaced affiliates from dismantled ransomware operations and freelance threat actors seeking robust infrastructure.

The organization operates two distinct ransomware variants based on leaked source code from established families. Their initial variant utilized the leaked LockBit 3.0 (Black) builder, allowing them to rapidly deploy effective ransomware without developing complex encryption mechanisms from scratch.

In July 2024, DragonForce introduced a second variant based on the Conti V3 codebase, providing affiliates with enhanced customization capabilities. This dual-variant approach demonstrates the group’s technical sophistication and commitment to providing affiliates with diverse attack options.

The group’s business model reflects modern cybercrime trends, offering a comprehensive platform that includes attack management tools, automated features, and customizable builders.

Affiliates can tailor ransomware samples by disabling targeted security features, configuring encryption parameters, and personalizing ransom notes.

In early 2025, DragonForce expanded its offerings by introducing a white-label ransomware service, enabling affiliates to rebrand payloads under alternative names for additional fees.

Attack Vectors and Initial Access Techniques

DragonForce employs multiple sophisticated vectors to achieve initial access to target networks, demonstrating the group’s understanding of diverse organizational vulnerabilities. 

Phishing campaigns remain a primary attack vector, with operators crafting convincing spear-phishing emails containing malicious attachments or links that deploy ransomware payloads when executed by unsuspecting users.

These campaigns often target specific individuals within organizations using social engineering techniques to increase success rates.

Exploitation of known vulnerabilities represents another critical attack vector, with DragonForce operators actively targeting unpatched systems.

The group has specifically been associated with exploiting several high-impact vulnerabilities, including CVE-2021-44228 (Log4Shell), CVE-2023-46805 (Ivanti Connect Secure Authentication Bypass), CVE-2024-21412 (Microsoft Windows SmartScreen Bypass), CVE-2024-21887 (Ivanti Connect Secure Command Injection), and CVE-2024-21893 (Ivanti Connect Secure Path Traversal).

DragonForce affiliates systematically target organizations with poorly secured remote access infrastructure, leveraging stolen or weak credentials to establish a persistent network presence.

The group also exploits trusted relationships, as demonstrated in a recent incident where attackers gained access through remote management software installed by a previous hosting company that was never properly removed.

In some cases, DragonForce operators have gained initial access by exploiting compromised managed service provider (MSP) relationships, allowing them to move laterally across multiple client environments through trusted connections.

This technique amplifies the impact of individual breaches by providing access to numerous organizations through a single compromise point.

Remote Desktop Protocol (RDP) and VPN attacks constitute significant initial access methods, with operators conducting credential stuffing attacks and brute-force operations against exposed services.

Cyber Kill Chain.
Cyber Kill Chain. (Source: cybersecuritynews.com)

Tactics, Techniques, and Procedures (TTPs)

DragonForce’s operational methodology follows the MITRE ATT&CK framework across multiple tactics, demonstrating a sophisticated understanding of enterprise network compromise techniques.

Initial Access T1190 Exploit Public-Facing Application Exploits CVE-2021-44228 (Log4Shell), CVE-2023-46805, CVE-2024-21412, CVE-2024-21887, CVE-2024-21893 High Medium
Initial Access T1078 Valid Accounts Uses stolen/weak RDP and VPN credentials, brute force attacks on remote access services High Low
Initial Access T1566.001 Spearphishing Attachment Deploys ransomware through malicious email attachments targeting specific individuals High Medium
Initial Access T1566.003 Spearphishing via Service Conducts vishing (voice phishing) campaigns alongside email phishing Medium High
Initial Access T1199 Trusted Relationship Exploits compromised MSP relationships and previous hosting company access Medium High
Execution T1204.002 Malicious File Social engineering users to execute ransomware payloads, moves files to System32 High Low
Execution T1059.001 PowerShell Uses PowerShell for command execution, payload deployment, and system reconnaissance High Medium
Execution T1053.005 Scheduled Task/Job Creates scheduled tasks for persistence and automated execution Medium Low
Persistence T1574.011 Services File Permissions Weakness Installs AnyDesk remote access tool for persistent backdoor access High Medium
Persistence T1053.005 Scheduled Task/Job Establishes scheduled tasks to maintain persistence across reboots Medium Low
Persistence T1547.001 Registry Run Keys / Startup Folder Modifies registry Run keys to ensure malware execution at startup Medium Low
Privilege Escalation T1134 Access Token Manipulation Duplicates SYSTEM-level access tokens using DuplicateTokenEx() API High High
Privilege Escalation T1068 Exploitation for Privilege Escalation Leverages known vulnerabilities for escalation to administrator privileges Medium Medium
Defense Evasion T1027 Obfuscated Files or Information Embeds Chinese text signatures, uses code obfuscation techniques High High

Indicators of Compromise (IoCs)

Security teams should monitor for specific indicators associated with DragonForce campaigns to enable early detection and response. 

Network indicators include command and control server IP addresses: 2[.]147[.]68[.]96185[.]59[.]221[.]75, and 69[.]4[.]234[.]20. Notably, early campaign infrastructure was identified in Iran, suggesting international collaboration or infrastructure rental.

IoC Type Indicator Description Threat Level Detection Method
IP Address (C&C) 2.147.68.96 Command and Control server High Network monitoring, firewall logs
IP Address (C&C) 185.59.221.75 Command and Control server High Network monitoring, firewall logs
IP Address (C&C) 69.4.234.20 Command and Control server High Network monitoring, firewall logs
File Hash (SHA256) b9bba02d18bacc4bc8d9e4f70657d381568075590cc9d0e7590327d854224b32 DragonForce ransomware executable hash Critical File integrity monitoring, antivirus
File Hash (SHA256) ba1be94550898eedb10eb73cb5383a2d1050e96ec4df8e0bf680d3e76a9e2429 DragonForce payload hash Critical File integrity monitoring, antivirus
File Hash (SHA256) d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9 DragonForce variant hash Critical File integrity monitoring, antivirus
File Path C:\Users\Public\Documents\Winupdate.exe Exfiltration tool location High File system monitoring, EDR
File Path C:\Windows\System32\Winupdate.exe Alternative exfiltration tool path High File system monitoring, EDR
File Path C:\Users\Public\log.log System information log file Medium File system monitoring
File Path C:\Windows\System32\ Common payload deployment directory Medium Directory monitoring
Filename Winupdate.exe Data exfiltration utility (GoLang) High Process monitoring, EDR
Filename FileSeek.exe File discovery reconnaissance tool Medium Process monitoring
Filename README.txt Ransom note filename Low File system monitoring
Filename SystemBC SOCKS5 backdoor for persistence High Network monitoring, process monitoring
File Extension .dragonforce_encrypted Encrypted file extension Medium File system monitoring
Domain (.onion) z3wqggtxft7id3ibr7srivv5gjof5fwg76slewnzwwakjuf3nlhukdid.onion DragonLeaks leak site High Network monitoring, DNS logs
Domain (.onion) 3pktcrcbmssvrnwe5skburdwe2h3v6ibdnn5kbjqihsg6eu6s6b7ryqd.onion Alternative leak site domain High Network monitoring, DNS logs

The Marks & Spencer incident in April 2025 caused estimated losses of £300 million and months-long operational disruption, with attackers sending direct emails to the CEO demanding ransom payments.

These cases illustrate DragonForce’s capability to target both government infrastructure and private sector organizations with devastating effectiveness, emphasizing the critical need for comprehensive cybersecurity measures and incident response planning.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

——————————————————–


Click Here For The Original Source.

.........................

National Cyber Security

FREE
VIEW