Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Never Stop Exploring (July 2025 Wallpapers Edition)

      June 30, 2025

      How AI further empowers value stream management

      June 27, 2025

      12 Top ReactJS Development Companies in 2025

      June 27, 2025

      Not sure where to go with AI? Here’s your roadmap.

      June 27, 2025

      I never thought I’d praise a kickstand power bank – until I tried this one

      June 30, 2025

      I replaced my work PC with this Alienware laptop – now I’m wondering why I hadn’t done this sooner

      June 30, 2025

      How to set up Alexa to receive notifications on Prime Day deals you want

      June 30, 2025

      How proxy servers actually work, and why they’re so valuable

      June 30, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      What’s the difference between named functions and arrow functions in JavaScript?

      June 30, 2025
      Recent

      What’s the difference between named functions and arrow functions in JavaScript?

      June 30, 2025

      Spring Boot + Swagger: A Complete Guide to API Documentation

      June 30, 2025

      Wire Room Math: AI + SME = (Less Compensation Paid) X (Headline Risk + Payment Errors)^2

      June 30, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Artix Linux: Introduzione di XLibre nelle Build Sperimentali

      June 30, 2025
      Recent

      Artix Linux: Introduzione di XLibre nelle Build Sperimentali

      June 30, 2025

      Orange Pi R2S Single Board Computer Running Linux: Introduction

      June 30, 2025

      vmstat – reports virtual memory statistics

      June 30, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»DragonForce Claims to Be Taking Over RansomHub Ransomware Infrastructure

    DragonForce Claims to Be Taking Over RansomHub Ransomware Infrastructure

    April 2, 2025

    DragonForce takes over RansomHub announcement

    The DragonForce ransomware group claims to be taking over the infrastructure of RansomHub, the largest ransomware group in the last year, Cyble threat intelligence researchers reported in an advisory to clients today.

    Cyble said the moniker behind the operators of DragonForce announced a new “project” on the RAMP forum and subsequently posted the same information on their onion-based data leak site (DLS). DragonForce said the group is launching fresh infrastructure – with two new onion links secured by CAPTCHA, similar to DragonForce’s native tor site approach – but displaying the logo of the RansomHub ransomware group.

    While it’s unclear if DragonForce acquired RansomHub or simply compromised it, the official RansomHub onion site has been offline since March 31, fueling speculation of a possible takeover, Cyble said.

    DragonForce and RansomHub: New Relationship Unclear

    DragonForce’s post on RAMP read:

    “Hi. Don’t worry RansomHub will be up soon, they just decided to move to our infrastructure! We are Reliable partners.

    “A good example of how “projects” work, a new option from the DragonForce Ransomware Cartel!”

    A postscript read (image below): “RansomHub hope you are doing well, consider our offer! We are waiting for everyone in our ranks”DragonForce Takes Over RansomHub

    DragonForce made a similar claim on the group’s Tor-based Data Leak Site (DLS) – and previewed a new onion site bearing the RansomHub logo (image below).

    DragonForce RansomHub
    Preview of new onion site posted by DragonForce on RAMP forum and bearing the RansomHub Logo

    DragonForce Ransomware Emerges As a Significant Player

    While it is unclear what the nature of the new arrangement is between the two groups, the announcement follows a March 18 announcement by DragonForce of a major expansion of its ransomware-as-a-service (RaaS) operation, Cyble said.

    The group introduced a franchise-like model allowing affiliates to launch their own ransomware brands under the DragonForce Ransomware Cartel. Affiliates receive full backend support, including admin/client panels, data hosting, and 24/7 infrastructure with anti-DDoS protection, providing autonomy while maintaining centralized control.

    DragonForce also rolled out technical upgrades across its ransomware lockers for ESXi, NAS, BSD, and Windows systems. Enhancements include encryption status tracking, detached execution, persistent UI messaging, and improved recovery mechanisms. The encryption engine was further hardened with two-pass header protection and BearSSL AES-CTR implementation using external entropy sources, “signaling DragonForce’s ambition to scale its operations with a more professionalized and affiliate-friendly infrastructure,” Cyble said.

    RansomHub Future Uncertain

    While it’s not clear what happened between the two ransomware groups, RansomHub put together an impressive run, besting all competitors since February 2024 (image below).

    top ransomware groups 2024-2025
    Most victims claimed by ransomware groups Feb. 2024-March 2025

    RansomHub’s staying power at the top has been driven by multiple factors, in Cyble’s analysis, including perceptions of greater transparency than predecessor groups, predictable payouts, and well-packaged attack playbooks for affiliates.

    It remains to be seen what form RansomHub and DragonForce will take on next. We will continue to follow this breaking story and update it as new information becomes available.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleSmashing Security podcast #411: The fall of Troy, and whisky barrel scammers
    Next Article Novels That Offer Peace After Long Days

    Related Posts

    Security

    ⚡ Weekly Recap: Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and more

    June 30, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-36593 – Dell OpenManage Network Integration RADIUS Authentication Bypass

    June 30, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Chaos Testing Explained

    Development

    Distribution Release: Escuelas Linux 8.12

    News & Updates

    CVE-2025-4592 – WordPress Free AI Image Generator CSRF Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Shadowenv performs a set of manipulations to the process environment

    Linux

    Highlights

    CVE-2025-0917 – IBM Cognos Analytics Stored Cross-Site Scripting

    June 11, 2025

    CVE ID : CVE-2025-0917

    Published : June 11, 2025, 6:15 p.m. | 2 hours, 13 minutes ago

    Description : IBM Cognos Analytics 11.2.0, 11.2.1, 11.2.2, 11.2.3, 11.2.4, 12.0.0, 12.0.1, 12.0.2, 12.0.3, and 12.0.4 is vulnerable to stored cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.

    Severity: 5.5 | MEDIUM

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Stay prepared for summer road trips with this discounted Nexpow roadside emergency bundle

    June 3, 2025

    Inside the Mind of the Adversary: Why More Security Leaders Are Selecting AEV

    June 6, 2025

    Microsoft Copilot’s next big upgrade takes on NotebookLM and could save you hours of research time

    April 4, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.