Dragonforce Ransomware Claims Attack on U.S. Hydraulics Firm Dynex/Rivett

Dragonforce Ransomware Threatens to Leak Data from U.S. Manufacturer Dynex/Rivett Inc.

HIGH
March 19, 2026
3m read
RansomwareThreat ActorCyberattack

Impact Scope

Affected Companies

Dynex/Rivett Inc.

Industries Affected

ManufacturingCritical Infrastructure

Geographic Impact

United States (national)

Related Entities

Threat Actors

Dragonforce

Other

Dynex/Rivett Inc.

Full Report

Executive Summary

On March 18, 2026, the Dragonforce ransomware group added U.S. hydraulic systems manufacturer Dynex/Rivett Inc. to its list of victims. The group posted a claim of a successful cyberattack and issued a public ultimatum, threatening to leak a 'full leak' of stolen data unless the company engages in negotiations. This incident follows the standard double-extortion model, where threat actors combine data encryption with data exfiltration to increase their leverage for a ransom payment. The attack underscores the continued targeting of the manufacturing and industrial sectors by ransomware gangs seeking to exploit the high cost of operational downtime.


Threat Overview

  • Threat Actor: Dragonforce, a ransomware group employing double-extortion tactics.
  • Victim: Dynex/Rivett Inc., a U.S.-based company in the hydraulic components and systems industry.
  • Tactic: The group claims to have exfiltrated sensitive data and is using the threat of a public leak to extort a ransom payment. This is a classic double-extortion strategy (T1486 - Data Encrypted for Impact and T1567 - Exfiltration Over Web Service).
  • Status: The data has not yet been leaked, as the threat is conditional on the company's failure to contact the attackers.

Technical Analysis

While specific details of the intrusion are not available, a typical ransomware attack on a manufacturing company like Dynex/Rivett would likely follow this pattern:

  1. Initial Access: Common vectors include exploiting vulnerabilities in public-facing services like VPNs or RDP (T1190 - Exploit Public-Facing Application), or through successful phishing campaigns (T1566 - Phishing).
  2. Credential Access & Discovery: Once inside, the attackers would use tools like Mimikatz or conduct Kerberoasting (T1558 - Steal or Forge Kerberos Tickets) to escalate privileges and discover critical assets like domain controllers, file servers, and backup systems.
  3. Data Exfiltration: Before deploying the ransomware, the actors would identify and exfiltrate valuable data, such as intellectual property, financial records, and employee information, to a cloud storage provider under their control.
  4. Impact: The final step is the deployment of the Dragonforce ransomware payload across the network, encrypting servers and workstations to disrupt business and manufacturing operations.

Impact Assessment

A successful ransomware attack on a manufacturer like Dynex/Rivett can have severe consequences:

  • Operational Disruption: Encryption of systems controlling manufacturing processes, inventory, and shipping can halt production entirely, leading to significant revenue loss and supply chain delays.
  • Data Breach: The public leak of stolen data can expose sensitive intellectual property (e.g., product designs, manufacturing processes), employee PII, and confidential customer information.
  • Financial Costs: The victim faces costs from ransom payments (if they choose to pay), incident response and recovery efforts, legal fees, and potential regulatory fines.
  • Reputational Damage: A public breach can damage the company's reputation with customers and partners.

Detection & Response

  1. Monitor for Ransomware Precursors: Use EDR and SIEM solutions to detect early-stage attacker activity, such as the use of credential dumping tools, lateral movement via RDP, or large-scale data staging on internal servers.
  2. Network Egress Monitoring (D3FEND: User Data Transfer Analysis): Monitor outbound network traffic for large, anomalous data transfers, which could indicate data exfiltration in progress.
  3. Backup Integrity: Regularly check the integrity and accessibility of backups. Ensure backups are isolated from the primary network (offline or immutable) to prevent them from being encrypted by the attackers.

Mitigation

  1. Secure Internet-Facing Systems: Harden all internet-facing devices. Apply patches promptly, disable unused ports, and enforce strong password and MFA policies on all remote access services (VPN, RDP).
  2. Network Segmentation: Segment the network to separate IT systems from Operational Technology (OT) systems. This can prevent a ransomware attack on the corporate network from spreading to the factory floor.
  3. Immutable Backups: Maintain multiple copies of critical data, with at least one copy stored offline or in an immutable storage location. Regularly test the restoration process.
  4. User Training: Train employees to recognize and report phishing emails, which are a primary initial access vector for ransomware attacks.

Timeline of Events

1
March 18, 2026
The Dragonforce ransomware group posts a claim of a successful cyberattack against Dynex/Rivett Inc.
2
March 19, 2026
This article was published

MITRE ATT&CK Mitigations

Maintain regular, tested, and isolated backups to ensure data can be restored without paying a ransom.

Keep all software, especially on internet-facing systems, patched and up-to-date to prevent initial access via exploitation.

Mapped D3FEND Techniques:

Enforce MFA on all remote access accounts (VPN, RDP) to protect against credential-based attacks.

Mapped D3FEND Techniques:

Sources & References

Dragonforce Ransomware Attack on Dynex/Rivett Inc.
DeXpose (dexpose.io) March 18, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

RansomwareDragonforceDouble ExtortionManufacturingData Leak

📢 Share This Article

Help others stay informed about cybersecurity threats