Deep dive into DragonForce ransomware and its Scattered Spider connection
嗯,用户让我帮忙总结一篇文章,控制在100字以内,而且不需要特定的开头。我先看看文章内容。 文章讲的是DragonForce勒索软件的发展和演变,提到了他们如何利用漏洞,与Scattered Spider的合作,以及他们的运营模式变化。还有提到他们作为RaaS服务,招募成员,并且在2025年转型为“卡特尔”,改变策略。 用户的需求是用中文总结,所以我要抓住关键点:DragonForce的崛起、与Scattered Spider的合作、RaaS模式、转型为卡特尔、以及对组织的威胁。 现在要控制在100字以内,所以需要简洁明了。可能的结构是:DragonForce作为勒索软件即服务,与Scattered Spider合作,利用漏洞和定制加密器进行攻击,转型为卡特尔扩大影响力。 这样总结应该能涵盖主要内容,并且符合用户的要求。 </think> DragonForce作为勒索软件即服务(RaaS)团伙,在2023年崛起后迅速发展为“勒索软件卡特尔”,通过与Scattered Spider等网络犯罪集团合作,利用漏洞和定制加密器攻击全球组织。其模式转型及高收益分成吸引更多 affiliates 加入,显著扩大了威胁范围。 2025-12-3 15:15:19 Author: www.bleepingcomputer.com(查看原文) 阅读量:8 收藏

Shadow puppets

Security researchers have conducted an in-depth analysis of DragonForce ransomware that initially emerged in 2023 and has since evolved into what it calls a "ransomware cartel."

The most recent variant exploits susceptible drivers such as truesight.sys and rentdrv2.sys to deactivate security programs, shut down protected processes and fix encryption vulnerabilities that were earlier linked to Akira ransomware.

The updated encryption scheme addresses vulnerabilities that were openly documented in a Habr publication referenced on DragonForce's leak website.

DragonForce has intensified its operations against organizations worldwide, publishing details of more compromised entities than in the previous year.

The group's most prominent breach, involving retail company Marks & Spencer, was carried out in partnership with the cybercriminal collective Scattered Spider hacking group.

The emergence of DragonForce

DragonForce operates as a ransomware-as-a-service (RaaS) operation. The group reignited ransomware activities, and has been actively recruiting nefarious collaborators through underground cybercrime platforms.

At the start, the gang used the compromised LockBit 3.0 builder to create its encryption tools and later transitioned to a modified version of Conti v3 source code.

Dragonforce blog

Transforming from ransomware group to “cartel”

Returning in 2025, DragonForce rebranded itself as a “ransomware cartel,” marking a sudden shift in operational strategy.

By offering affiliates 80% of profits, customizable encryptors and infrastructure, DragonForce lowers the barrier to entry for new and inexperienced cybercriminals.

The move encourages more affiliates to join the cartel and broaden its presence.

DragonForce and its Scattered Spider connection

DragonForce's partnership with Scattered Spider, a financially motivated threat actor known for sophisticated social engineering and initial access operations, has proven effective in enabling ransomware deployments across high-value targets.

Scattered Spider typically begins its intrusion by conducting reconnaissance on an organization’s staff to identify potential targets and develop convincing personas and pretexts.

The group collects details such as names, job titles, and other publicly available information using social media platforms and open-source intelligence tools. They then use advanced social engineering tactics to obtain or reset credentials and circumvent multifactor authentication through deceptive tactics such as MFA fatigue or SIM swapping.

Once access is gained, Scattered Spider signs in as the compromised user and registers its own device to maintain entry.

Following the initial breach, Scattered Spider establishes persistence by deploying remote monitoring and management (RMM) tools or tunneling services.

For example, these tools can include ScreenConnect, AnyDesk, TeamViewer and Splashtop. Once inside the network, Scattered Spider conducts thorough reconnaissance, targeting assets in SharePoint, credential repositories, backup servers and VPN configuration documentation.

In recent activity, Scattered Spider has leveraged AWS Systems Manager Inventory to identify additional systems for lateral movement. They utilize extract, transform and load (ETL) tools to compile gathered data into a central database, which is then exfiltrated to attacker-controlled MEGA or Amazon S3 storage services.

The operation concludes with the deployment of DragonForce ransomware, encrypting data across Windows, Linux and ESXi environments.

Better together ransomware

DragonForce represents a new, more organized and persistent threat, built on established ransomware frameworks but incrementally improved and distributed at scale.

Unlike groups that heavily customize their code, DragonForce focuses on cartel-style recruitment, affiliate operational flexibility and broad partnerships, making it a formidable and highly adaptable actor.

Coupled with Scattered Spider, cybercrime groups under cooperative models, rather than purely competitive ones, marks a shift that complicates defensive efforts for organizations worldwide.

Key takeaways

The DragonForce and Scattered Spider duo is a wakeup-call for "cartelization" cybercrime, where highly specialized threat actors combine their skills, in this case, Scattered Spider's elite social engineering and initial access skills and DragonForce's robust ransomware-as-a-service model, to execute devastating, high-profile attacks.

Their strategic alliance significantly elevates the threat landscape by creating a more efficient and adaptive criminal operation focused on breaching defenses by exploiting human error before leveraging sophisticated malware.

Looking ahead, IT security professionals must consider that defense requires addressing ransomware collaborative models head on.

Implement and strictly enforce phishing-resistant multifactor authentication (MFA) methods to neutralize Scattered Spider's primary initial access vectors, and focus on robust endpoint detection and response (EDR) solutions that alert the deployment of remote monitoring tools and the use of vulnerable drivers, which are the technical tell-tales of a handoff from an initial access broker to a ransomware affiliate.

Security teams need to anticipate that attacks are no longer single-entity threats, but coordinated, multistage intrusions using the best tools and techniques from an ecosystem of specialized cyber adversaries.

About TRU

The Acronis Threat Research Unit (TRU) is a team of cybersecurity experts specializing in threat intelligence, AI and risk management. The TRU team researches emerging threats, provides security insights and supports IT teams with guidelines, incident response and educational workshops.

See the latest TRU research

Sponsored and written by Acronis.


文章来源: https://www.bleepingcomputer.com/news/security/deep-dive-into-dragonforce-ransomware-and-its-scattered-spider-connection/
如有侵权请联系:admin#unsafe.sh