More than 80 manufacturing, transportation, and real estate organizations around the world, most of which are in the U.S., have been targeted by the DragonForce ransomware-as-a-service operation with attacks involving enhanced iterations of the LockBit and Conti ransomware payloads during the last 12 months, according to The Record, a news site by cybersecurity firm Recorded Future. Intrusions conducted by DragonForce, which has been suspected to be based in Malaysia, also involved the deployment of the SystemBC backdoor and the Mimikatz and Cobalt Strike tools to facilitate further compromise to advance its double extortion efforts, an analysis from Group-IB revealed. "This is unsurprising as modern ransomware operators are increasingly reusing and modifying builders from well known ransomware families that were leaked, to tailor to their needs," said Group-IB researchers. Such findings come after the ransomware gang was reported to have compromised the government of Palau, the Ohio Lottery, and Yakult Australia.
Ransomware
Global DragonForce attacks involve custom Conti, LockBit ransomware

(Adobe Stock)
An In-Depth Guide to Ransomware
Get essential knowledge and practical strategies to protect your organization from ransomware attacks.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds