Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Representative Line: Brace Yourself

      September 18, 2025

      Beyond the Pilot: A Playbook for Enterprise-Scale Agentic AI

      September 18, 2025

      GitHub launches MCP Registry to provide central location for trusted servers

      September 18, 2025

      MongoDB brings Search and Vector Search to self-managed versions of database

      September 18, 2025

      Distribution Release: Security Onion 2.4.180

      September 18, 2025

      Distribution Release: Omarchy 3.0.1

      September 17, 2025

      Distribution Release: Mauna Linux 25

      September 16, 2025

      Distribution Release: SparkyLinux 2025.09

      September 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      AI Momentum and Perficient’s Inclusion in Analyst Reports – Highlights From 2025 So Far

      September 18, 2025
      Recent

      AI Momentum and Perficient’s Inclusion in Analyst Reports – Highlights From 2025 So Far

      September 18, 2025

      Shopping Portal using Python Django & MySQL

      September 17, 2025

      Perficient Earns Adobe’s Real-time CDP Specialization

      September 17, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Valve Survey Reveals Slight Retreat in Steam-on-Linux Share

      September 18, 2025
      Recent

      Valve Survey Reveals Slight Retreat in Steam-on-Linux Share

      September 18, 2025

      Review: Elecrow’s All-in-one Starter Kit for Pico 2

      September 18, 2025

      FOSS Weekly #25.38: GNOME 49 Release, KDE Drama, sudo vs sudo-rs, Local AI on Android and More Linux Stuff

      September 18, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»DragonForce Claims to Be Taking Over RansomHub Ransomware Infrastructure

    DragonForce Claims to Be Taking Over RansomHub Ransomware Infrastructure

    April 2, 2025

    DragonForce takes over RansomHub announcement

    The DragonForce ransomware group claims to be taking over the infrastructure of RansomHub, the largest ransomware group in the last year, Cyble threat intelligence researchers reported in an advisory to clients today.

    Cyble said the moniker behind the operators of DragonForce announced a new “project” on the RAMP forum and subsequently posted the same information on their onion-based data leak site (DLS). DragonForce said the group is launching fresh infrastructure – with two new onion links secured by CAPTCHA, similar to DragonForce’s native tor site approach – but displaying the logo of the RansomHub ransomware group.

    While it’s unclear if DragonForce acquired RansomHub or simply compromised it, the official RansomHub onion site has been offline since March 31, fueling speculation of a possible takeover, Cyble said.

    DragonForce and RansomHub: New Relationship Unclear

    DragonForce’s post on RAMP read:

    “Hi. Don’t worry RansomHub will be up soon, they just decided to move to our infrastructure! We are Reliable partners.

    “A good example of how “projects” work, a new option from the DragonForce Ransomware Cartel!”

    A postscript read (image below): “RansomHub hope you are doing well, consider our offer! We are waiting for everyone in our ranks”DragonForce Takes Over RansomHub

    DragonForce made a similar claim on the group’s Tor-based Data Leak Site (DLS) – and previewed a new onion site bearing the RansomHub logo (image below).

    DragonForce RansomHub
    Preview of new onion site posted by DragonForce on RAMP forum and bearing the RansomHub Logo

    DragonForce Ransomware Emerges As a Significant Player

    While it is unclear what the nature of the new arrangement is between the two groups, the announcement follows a March 18 announcement by DragonForce of a major expansion of its ransomware-as-a-service (RaaS) operation, Cyble said.

    The group introduced a franchise-like model allowing affiliates to launch their own ransomware brands under the DragonForce Ransomware Cartel. Affiliates receive full backend support, including admin/client panels, data hosting, and 24/7 infrastructure with anti-DDoS protection, providing autonomy while maintaining centralized control.

    DragonForce also rolled out technical upgrades across its ransomware lockers for ESXi, NAS, BSD, and Windows systems. Enhancements include encryption status tracking, detached execution, persistent UI messaging, and improved recovery mechanisms. The encryption engine was further hardened with two-pass header protection and BearSSL AES-CTR implementation using external entropy sources, “signaling DragonForce’s ambition to scale its operations with a more professionalized and affiliate-friendly infrastructure,” Cyble said.

    RansomHub Future Uncertain

    While it’s not clear what happened between the two ransomware groups, RansomHub put together an impressive run, besting all competitors since February 2024 (image below).

    top ransomware groups 2024-2025
    Most victims claimed by ransomware groups Feb. 2024-March 2025

    RansomHub’s staying power at the top has been driven by multiple factors, in Cyble’s analysis, including perceptions of greater transparency than predecessor groups, predictable payouts, and well-packaged attack playbooks for affiliates.

    It remains to be seen what form RansomHub and DragonForce will take on next. We will continue to follow this breaking story and update it as new information becomes available.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleSmashing Security podcast #411: The fall of Troy, and whisky barrel scammers
    Next Article Novels That Offer Peace After Long Days

    Related Posts

    Development

    AI Momentum and Perficient’s Inclusion in Analyst Reports – Highlights From 2025 So Far

    September 18, 2025
    Development

    Shopping Portal using Python Django & MySQL

    September 17, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    The New Region

    Web Development

    I compared my Sonos Arc Ultra with Samsung’s flagship soundbar, and it’s pretty dang close

    News & Updates

    CVE-2025-8875 – N-able N-Central Insecure Deserialization Vulnerability – [Actively Exploited]

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2024-11917 – Xing and Google Vulnerability: Authentication Bypass in JobSearch WP Job Board Plugin

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2025-53003 – Janssen Project IAM Unverified Scope Information Disclosure

    July 1, 2025

    CVE ID : CVE-2025-53003

    Published : July 1, 2025, 2:15 a.m. | 5 hours, 18 minutes ago

    Description : The Janssen Project is an open-source identity and access management (IAM) platform. Prior to version 1.8.0, the Config API returns results without scope verification. This has a large internal surface attack area that exposes all sorts of information from the IDP including clients, users, scripts ..etc. This issue has been patched in version 1.8.0. A workaround for this vulnerability involves users forking and building the config api, patching it in their system following commit 92eea4d.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Celebrating an academic-industry collaboration to advance vehicle technology

    June 17, 2025

    Inventory Management 25B – Path to Redwood Experience 1.2.3.

    May 30, 2025

    Password Strength Estimator Validation in Laravel

    August 27, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.