Table of Contents
February 28, 2025
|
8m

DragonForce Ransomware


A stylized blue dragon head logo with binary code elements and "Dragon Force" text against a dark background, suggesting a cybersecurity or gaming theme.

DragonForce Ransomware has rapidly emerged as a significant threat in the cybercrime landscape. Operating as a Ransomware-as-a-Service (RaaS), DragonForce leverages a double extortion strategy, encrypting victims' data and threatening to leak stolen information on the dark web. This article provides a comprehensive overview of DragonForce, examining its origins, tactics, techniques, and procedures (TTPs), target profile, notable attack campaigns, and defense strategies. While exhibiting some unusual behaviors, DragonForce remains a serious threat to organizations worldwide.

Origins & Evolution

DragonForce ransomware first appeared in August 2023. Early versions were based on the leaked LockBit 3.0 builder. This reliance on pre-existing, well-known ransomware families suggests a lower barrier to entry for the group and faster deployment capabilities. By June 26, 2024, DragonForce launched its own RaaS affiliate program, providing its members with customizable tools and an 80% share of ransom payments. More recently, the group transitioned to using a modified version of ContiV3 ransomware.

The identity of the individuals behind DragonForce remains unconfirmed. Some cybersecurity researchers have speculated about a possible connection to the Malaysian hacking group and forum "DragonForce Malaysia." However, this link is unconfirmed and could be intentional misdirection or coincidence. DragonForce Malaysia denied the association on their Telegram channel stating that their goals are entirely different, as they oppose oppression and do not engage in extortion for personal gain. The double ransom note incident in Palau (detailed below) might also suggest limited technical expertise within the group in its early stages.

Tactics & Techniques

DragonForce employs a multi-faceted approach to its attacks, combining well-established ransomware techniques with sophisticated methods to maximize impact:

  • Double Extortion: This is DragonForce's core tactic. They encrypt victims' data, rendering it inaccessible, and simultaneously exfiltrate sensitive information. They then threaten to publish the stolen data on their dedicated leak site (DLS), "DragonLeaks," if the ransom is not paid.

  • Ransomware-as-a-Service (RaaS): DragonForce provides its affiliates with a control panel. This panel allows them to customize ransomware samples, adjust encryption settings, disable security features, and personalize ransom notes. This level of customization makes attacks more adaptable and potentially harder to detect with generic signatures.

  • Initial Access: Common infection vectors include phishing emails with malicious attachments or links, and exploitation of vulnerabilities in Remote Desktop Protocols (RDP) and Virtual Private Network (VPN) solutions. Observed attacks have also involved compromising public-facing web servers using valid domain credentials. One of the common type of attacks is a watering hole attack https://thesecmaster.com/what-is-watering-hole-attack-how-to-prevent-watering-hole-attack.

  • Persistence: DragonForce uses various techniques to maintain a foothold in compromised networks, including:

* Modifying the Run registry.

* Creating Windows services and scheduled tasks.

* Using the SystemBC backdoor. Windows registry structure https://thesecmaster.com/windows-registry-structure-understanding-keys-values-and-hives-in-windows-registry can be modified to make the system vulnerable..

* "Bring Your Own Vulnerable Driver" (BYOVD) to disable security tools.

* Deleting Windows Event Logs to remove traces of their activity.

* Anti-analysis techniques inherited from Conti (ADVobfuscator, hashed API resolution). DragonForce uses anti-analysis techniques https://thesecmaster.com/exploring-viristotal-online-malware-scanning-tool-for-security-analysts-soc-analyst to evade detection.

  • System Recovery Prevention: DragonForce deletes shadow copies using COM objects and WMIC commands, making data recovery more difficult.

  • Unusual Behavior: DragonForce has been known to publish audio recordings of its communications with victims on its leak site. This behavior, which includes phone conversations with front desk employees to pressure companies, suggests a level of desperation or an attempt to gain notoriety.

  • Code Base: Relies on leaked code from Lockbit 3.0 and ContiV3. This code is designed to leverage advanced encryption https://thesecmaster.com/what-is-symmetric-and-asymmetric-encryption techniques.

Targets or Victimology

DragonForce's targeting strategy appears broad, with no specific limitations on targeted sectors or countries. However, some patterns have emerged:

  • Industries: Manufacturing, real estate, and transportation have been frequently targeted. Other affected sectors include healthcare, commerce & shopping, business services, education, financial services, government, technology and many others.

  • Geographic Focus: The United States is the most targeted country, followed by the United Kingdom and Australia. However, victims have been reported in numerous countries, highlighting a global reach.

  • Victim Profile: DragonForce doesn't appear to discriminate based on organization size, although high-revenue entities and those in critical sectors are likely to be attractive targets due to the potential for larger ransom payments and greater disruption. Companies should know the importance of personal information https://thesecmaster.com/what-is-personal-information-and-how-to-protect-personal-information.

Attack Campaigns

Several notable attack campaigns have been attributed to DragonForce:

  • Ohio Lottery (December 2023): This was DragonForce's earliest known attack. The group claimed to have stolen over 600 GB of data, including 3 million records containing sensitive information (names, email addresses, SSNs, etc.).

  • Yakult Australia: DragonForce claimed a breach of 95.19 GB of company data.

  • Coca-Cola (Singapore): Claimed breach of 413.92 GB of data.

  • Palau Government: This incident involved ransom notes from both LockBit and DragonForce, with conflicting instructions and non-functional Tor links. DragonForce threatened to release data after negotiations supposedly broke down, but Palauan authorities denied any contact. This incident is particularly unusual and highlights the potential for confusion or misattribution when dealing with leaked ransomware builders. The TOR network structure https://thesecmaster.com/detailed-anatomy-of-the-tor-network-structure-of-the-tor-network has been used by threat actors.

  • Aussizz Group: DragonForce claimed to have exfiltrated and encrypted nearly 300GB of sensitive data from this educational and migration consultancy.

  • As of August 2024, the Group-IB has observed 82 victims over the past year. Moveit breach https://thesecmaster.com/moveit-breach-exposes-20-million-employee-data is one of the causes for data exposure.

Defenses

Combating DragonForce ransomware, and ransomware threats in general, requires a multi-layered security approach:

Conclusion

DragonForce ransomware represents a growing threat to organizations across various sectors. While exhibiting some unusual tactics, such as publishing audio recordings of negotiations, the group's core strategy of double extortion and its reliance on leaked, but effective, ransomware code make it a formidable adversary. The RaaS model further amplifies the threat by enabling less-skilled actors to participate in attacks. Organizations must adopt a proactive, multi-layered security approach that includes robust backups, vulnerability management, strong authentication, employee training, and incident response planning to mitigate the risk posed by DragonForce and similar ransomware threats. Continuous vigilance and adaptation to the evolving threat landscape are essential for effective defense. One of the key defense mechanism is to know how to identify vulnerabilities https://thesecmaster.com/blog/key-strategies-to-identify-vulnerabilities.

Found this article interesting? Keep visit thesecmaster.com, and our social media page on FacebookLinkedInTwitterTelegramTumblrMedium, and Instagram and subscribe to receive tips like this. 

You may also like these articles:

Arun KL

Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.

Recently added

Threats

View All

Learn More About Cyber Security Security & Technology

“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”

Cybersecurity All-in-One For Dummies - 1st Edition

"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.

Tools

Featured

View All

Learn Something New with Free Email subscription

Subscribe

Subscribe