The cybercrime landscape continues to evolve with the emergence of DragonForce, a new ransomware group built upon the leaked source code of the notorious Conti operation. Researchers from the Acronis Threat Research Unit have analyzed this new threat, highlighting its unique 'cartel-style' business model. Unlike a typical Ransomware-as-a-Service (RaaS) where affiliates use a centralized platform, DragonForce provides its partners with a malware builder. This allows affiliates to generate their own distinct, branded ransomware variants while leveraging the proven and potent Conti codebase. This model lowers the barrier to entry for sophisticated attacks and signals a dangerous trend of modularization in the ransomware ecosystem.
DragonForce represents the dangerous second life of leaked source code from major threat groups. After the Conti leaks in 2022, its code became a valuable resource for other criminals. DragonForce has capitalized on this by creating a framework that empowers other, smaller groups. They actively recruit affiliates and equip them with the tools to launch their own campaigns.
This 'cartel' model means that instead of a single DragonForce ransomware, we may see numerous variants with different names and ransom notes, all stemming from the same core builder. One such group, identified as 'Devman,' has already been observed deploying ransomware created using the DragonForce platform. The DragonForce operators themselves are active, having issued public threats to leak victim data, indicating ongoing campaigns against unspecified targets.
At its core, the DragonForce ransomware is technically a derivative of Conti. Key characteristics include:
T1021.002 - SMB/Windows Admin Shares.T1486 - Data Encrypted for Impact and likely deletes shadow copies via T1490 - Inhibit System Recovery to hinder restoration efforts.The emergence of DragonForce and its cartel model has several significant implications for the threat landscape:
Since DragonForce is based on Conti, defenders can hunt for Conti-like TTPs:
| Type | Value | Description |
|---|---|---|
| command_line_pattern | net view or net use |
Used for network reconnaissance to find shares for lateral movement. |
| network_traffic_pattern | High volume of SMB traffic (port 445) | Indicates attempts to spread across the network. |
| process_name | vssadmin.exe |
Used with Delete Shadows argument to inhibit system recovery. |
| file_name | readme.txt or similar |
Common ransom note name used by Conti variants. |
Defending against Conti-derived threats requires a multi-layered approach.
Network Traffic Analysis is key.Network Isolation.Segmenting the network can contain the spread of ransomware that uses SMB for lateral movement.
Modern EDR/antivirus solutions can detect and block known Conti behaviors and signatures.
Hardening OS configurations, such as disabling SMBv1 and restricting administrative shares, can reduce the attack surface.
The ultimate safeguard against ransomware like DragonForce is a robust and tested backup strategy. Organizations must implement the 3-2-1 backup rule: maintain at least three copies of data, on two different types of media, with one copy stored offline and immutable (air-gapped or on write-once media). Since DragonForce, like Conti, actively attempts to delete shadow copies and other local backups, having an off-site, disconnected copy is non-negotiable. Regular, automated testing of the restoration process is equally critical to ensure that backups are viable and that recovery time objectives (RTOs) can be met in a real incident.
To counter the SMB-based lateral movement used by DragonForce and Conti, strong network segmentation is essential. Critical assets, such as domain controllers, databases, and backup servers, should be placed in highly restricted network segments. Firewall rules should be configured with a default-deny policy, only allowing traffic on specific ports and protocols that are absolutely necessary for business functions. East-west traffic between server VLANs should be heavily scrutinized and monitored. This 'zero-trust' approach to internal networking can contain a ransomware infection to a single segment, preventing it from spreading throughout the entire enterprise and significantly reducing the overall impact of an attack.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats