Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers

November 9, 2025

Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery

November 9, 2025

CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks

November 9, 2025
Facebook X (Twitter) Instagram
Monday, November 10
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»DragonForce Cartel Emerges as Conti-Derived Ransomware Threat
News

DragonForce Cartel Emerges as Conti-Derived Ransomware Threat

Team-CWDBy Team-CWDNovember 7, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new ransomware operation built on Conti’s leaked source code has surfaced with cartel-like ambitions in the cybercrime ecosystem.

The DragonForce group, which retains Conti’s core encryption behavior and network-spreading capabilities, has begun conducting coordinated attacks and recruiting affiliates using a shared platform.

Recently, DragonForce has shifted from a standard ransomware-as-a-service model to a self-styled cartel structure that encourages affiliates to create branded variants. This evolution has been highlighted by recent samples showing groups like Devman deploying ransomware compiled with DragonForce’s builder.

According to Acronis Threat Research Unit (TRU) researchers, DragonForce uses the same ChaCha20 and RSA encryption combination found in Conti, generating a unique key per file and appending a 10-byte metadata block that encodes encryption mode, percentage and size.

Operators have continued active campaigns, threatening to delete decryptors and leak data on September 2 and September 22.

Technical Characteristics

DragonForce encrypts both local storage and network shares via SMB (Server Message Block). Acronis has documented unchanged Conti-style routines alongside a hidden configuration system that replaces visible command-line parameters.

The ransomware supports several encryption modes:

  • Full mode (0x24)

  • Partial (0x25)

  • Header-only (0x26)

Growing Affiliate Network

Devman’s emergence illustrates DragonForce’s recruitment model. The group initially deployed a Mamona-based variant before shifting to a DragonForce-built strain with near-identical ransom note formatting.

The timing suggests Devman first tested branding under Mamona, a project linked to operators behind Eldorado and BlackLock, then moved into the DragonForce ecosystem to leverage its tooling and infrastructure.

DragonForce has also aligned with Scattered Spider, a group known for initial access operations tied to BlackCat, Ransomhub and Qilin. This partnership drew scrutiny following an incident impacting UK retailer Marks & Spencer, which researchers attribute to cooperative DragonForce–Scattered Spider activity shortly after DragonForce rebranded as a “cartel.”

Read more on ransomware cartels: Ransom Cartel Linked to Russia-Based REvil Ransomware Group

Aggressive Tactics and Defense

The group has pursued aggressive dominance tactics, defacing BlackLock’s leak site and attempting a takeover of Ransomhub’s servers. This pressure may have forced some Ransomhub affiliates to migrate to rivals such as Qilin and DragonForce.

“By rebranding itself as a ‘cartel,’ DragonForce aimed to strengthen its influence and alliances in the ransomware landscape, proving its dominance by defacing or taking control of rival groups’ infrastructure,” Acronis said.

To defend against ransomware threats, security experts advise organizations to implement robust backup practices, restrict lateral movement through network segmentation and monitor for unusual access to shared resources.

In addition, consistent patching, endpoint protection and user awareness training remain core layers of defense against financially motivated actors seeking to exploit gaps in enterprise environments.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNew AI-Targeted Cloaking Attack Tricks AI Crawlers Into Citing Fake Info as Verified Facts
Next Article Experts Reports Sharp Increase in Automated Botnet Attacks Targeting PHP Servers and IoT Devices
Team-CWD
  • Website

Related Posts

News

CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers

November 9, 2025
News

Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery

November 9, 2025
News

CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks

November 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

The WhatsApp screen-sharing scam you didn’t see coming

November 6, 2025

How the always-on generation can level up their cybersecurity game

September 11, 2025

When ‘hacking’ your game becomes a security risk

October 17, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.