Deep dive into DragonForce ransomware and its Scattered Spider connection
Recorded: Dec. 3, 2025, 4:02 p.m.
| Original | Summarized |
Deep dive into DragonForce ransomware and its Scattered Spider connection News Featured North Korea lures engineers to rent identities in fake IT worker scheme Fake Calendly invites spoof top brands to hijack ad manager accounts University of Pennsylvania confirms new data breach after Oracle hack Google fixes two Android zero days exploited in attacks, 107 flaws Deep dive into DragonForce ransomware and its Scattered Spider connection Aisuru botnet behind new record-breaking 29.7 Tbps DDoS attack University of Phoenix discloses data breach after Oracle hack Score 65% off a Microsoft Surface with impressive performance Tutorials Latest How to access the Dark Web using the Tor Browser How to enable Kernel-mode Hardware-enforced Stack Protection in Windows 11 How to use the Windows Registry Editor How to backup and restore the Windows Registry How to start Windows in Safe Mode How to remove a Trojan, Virus, Worm, or other Malware How to show hidden files in Windows 7 How to see hidden files in Windows Webinars Latest Qualys BrowserCheck STOPDecrypter AuroraDecrypter FilesLockerDecrypter AdwCleaner ComboFix RKill Junkware Removal Tool Deals Categories eLearning IT Certification Courses Gear + Gadgets Security VPNs Popular Best VPNs How to change IP address Access the dark web safely Best VPN for YouTube Forums Startup Database HomeNewsSecurityDeep dive into DragonForce ransomware and its Scattered Spider connection Deep dive into DragonForce ransomware and its Scattered Spider connection Sponsored by Acronis December 3, 2025 Security researchers have conducted an in-depth analysis of DragonForce ransomware that initially emerged in 2023 and has since evolved into what it calls a "ransomware cartel." Transforming from ransomware group to “cartel” All-in-one integrated backup and cybersecurity platform for MSPs DragonForce and its Scattered Spider connection Acronis Previous Article Comments have been disabled for this article. Popular Stories ChatGPT is down worldwide, conversations disappeared for users Glassworm malware returns in third wave of malicious VS Code packages Google deletes X post after getting caught using a ‘stolen’ AI recipe infographic Sponsor Posts AI is a data-breach time bomb: Read the new report Hackers love the holidays! Share FREE Security Awareness Training to keep family & friends cyber-safe! Empowering IT teams with intelligence driven cyber threat research.
Follow us: Main Sections News Community Forums Useful Resources Welcome Guide Company About BleepingComputer Terms of Use - Privacy Policy - Ethics Statement - Affiliate Disclosure Copyright @ 2003 - 2025 Bleeping Computer® LLC - All Rights Reserved Login Username Password Remember Me Sign in anonymously Sign in with Twitter Not a member yet? Register Now Help us understand the problem. What is going on with this comment? Spam Abusive or Harmful Inappropriate content Strong language Other Read our posting guidelinese to learn what content is prohibited. Submitting... |
DragonForce ransomware, operating as a sophisticated “ransomware cartel,” has dramatically escalated its operations in 2025, significantly expanding its reach and impact through a strategic alliance with the cybercriminal collective, Scattered Spider. This report details the evolving tactics of DragonForce, highlighting its shift from a traditional ransomware group to a more organized, cartel-like structure, and the crucial role Scattered Spider plays in its success. The group’s methodology centers on delivering a robust Ransomware-as-a-Service (RaaS) model, lowering the barriers to entry for affiliates and expanding its operational capacity. The operation began with DragonForce leveraging compromised LockBit 3.0 builder tools, later transitioning to a modified version of Conti v3 source code, establishing a foundation for its ransomware deployment. This shift toward a cartel model involved 80% profit sharing for affiliates, coupled with customizable encryptors and infrastructure, creating a highly adaptable operational model. Key to DragonForce’s ongoing success is its partnership with Scattered Spider, a threat actor renowned for its sophisticated social engineering and initial access operations. Scattered Spider’s initial intrusion strategy relies heavily on reconnaissance, meticulously gathering data on potential targets through social media channels and open-source intelligence. This reconnaissance phase identifies employees, job titles, and other readily available information, enabling the group to construct highly persuasive and tailored social engineering campaigns. These campaigns focus on obtaining or resetting credentials—a critical step that often bypasses multi-factor authentication (MFA) due to the tactics of "MFA fatigue" or SIM swapping. Once inside, the compromised user logs in as the identified individual, registering their device to maintain persistent access. Following initial access, Scattered Spider establishes persistence by deploying remote monitoring and management (RMM) tools—such as ScreenConnect, AnyDesk, TeamViewer, and Splashtop—allowing for continued control of the compromised system. This deployment is followed by intensive reconnaissance, targeting key assets within the network, including SharePoint environments, credential repositories, backup servers, and VPN configuration documentation. Recent activity demonstrates the group’s utilization of AWS Systems Manager Inventory to identify additional systems for lateral movement. Critical to the operation is the group’s use of extract, transform, and load (ETL) tools to compile gathered data into a centralized database, facilitating efficient exfiltration. This data is then transmitted to attacker-controlled MEGA or Amazon S3 storage services, demonstrating a commitment to robust and secure data persistence. Ultimately, DragonForce ransomware is deployed across Windows, Linux, and ESXi environments, executing across a diverse range of systems. The alliance between DragonForce and Scattered Spider represents a significant shift in the threat landscape, marked by a move toward collaborative cybercrime models. Security professionals must recognize this trend and proactively address the challenges it presents. This includes implementing and strictly enforcing phishing-resistant MFA methods to neutralize Scattered Spider’s primary initial access vectors. Furthermore, focusing on robust endpoint detection and response (EDR) solutions that can alert to the deployment of remote monitoring tools and the use of vulnerable drivers—technical tell-tale signs of a transition from an initial access broker to a ransomware affiliate—is vital. Organizations need to anticipate that attacks are becoming increasingly coordinated and complex, utilizing the best tools and techniques from an ecosystem of specialized cyber adversaries. The ACORN Threat Research Unit (TRU) continuously monitors and researches emerging threats to provide security insights and guide IT teams. The TRU research team focuses on threat intelligence, AI and risk management. Their recent investigation strongly recommends a proactive defense strategy, prioritizing MFA, EDR, and vigilant monitoring of network activity to mitigate the evolving threat landscape posed by DragonForce and its strategic alliance with Scattered Spider. |