DragonForce ransomware group evolves new cartel business model


- DragonForce is selling its ransomware as a service that can be rebranded
- The group will handle malware development, leak sites, and more
- RaaS democratizes malware – as if AI hadn’t done enough damage
Inspired by drug gangs, ransomware group DragonForce is bringing a new business model to the ransomware scene, and it involves cooperating with other ransomware gangs.
DragonForce has now been observed offering a white-label affiliate model, allowing others to use their infrastructure and malware while branding attacks under their own name.
With this model, affiliates won’t need to manage the infrastructure and DragonForce will take care of negotitation sites, malware develpoment and data leak sites.
DragonForce evolves the ransomware scene with a new business model
“Advertised features include administration and client panels, encryption and ransom negotiation tools, a file storage system, a Tor-based leak site and .onion domain, and support services,” cybersecurity researchers from Secureworks explained.
Secureworks explained that, in a March 2025 underground post, DragonForce rebranded itself as a “cartel,” announcing a shift to a distributed model. DragonForce first appeared in August 2023.
Anubis, a much newer ransomware group that’s been operating since December 2024, has also launched its own affiliate scheme, including a traditional ransomware-as-a-service product that nets affiliates 80% of their ransoms.
Much like artificial intelligence has already democratized access to coding, these models are further extending access to ransomware, meaning that less technical threat actors can target victims. The flexibility and reduced operational burdens are also key selling points.
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
The exact number of affiliates using these schemes is virtually untraceable, however Bleeping Computer has reported that RansomBay has already joined DragonForce’s scheme.
“Cybercriminals are motivated by financial gain, so they are adopting innovative models and aggressive pressure tactics to shift the trend in their favor,” Secureworks added.
The usual principles apply when it comes to protecting yourself from any type of ransomware – regularly patching internet-facing devices, implementing phishing-resistant multi-factor authentication (MFA), maintaining robust backups and monitoring networks for malicious activity are all important steps to take.
You might also like
DragonForce is selling its ransomware as a service that can be rebranded The group will handle malware development, leak sites, and more RaaS democratizes malware – as if AI hadn’t done enough damage Inspired by drug gangs, ransomware group DragonForce is bringing a new business model to the ransomware scene,…
Recent Posts
- NYT Wordle today — answer and my hints for game #1476, Friday, July 4
- We confirmed Nintendo’s Switch 2 TV dock supports VRR — so why doesn’t it work with Switch 2?
- Chinese vendor launches liquid-cooled mini PC powered by AMD’s most powerful AI processor, with a built-in 400W PSU
- Here are the letters that convinced Google and Apple to keep TikTok online
- The best early Prime Day deal? A free 6-month Amazon Prime membership for students
Archives
- July 2025
- June 2025
- May 2025
- April 2025
- March 2025
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021