• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
TechTrendFeed
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT
No Result
View All Result
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT
No Result
View All Result
TechTrendFeed
No Result
View All Result

New DEVMAN Ransomware by DragonForce Targets Home windows 10 and 11 Customers

Admin by Admin
July 1, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


A brand new ransomware variant, dubbed DEVMAN, has surfaced within the cyberthreat panorama, showcasing a fancy lineage tied to the infamous DragonForce household.

Constructed on a basis of DragonForce and Conti codebases, DEVMAN introduces distinctive identifiers such because the .DEVMAN file extension and distinct behavioral traits, setting it aside whereas retaining core similarities with its predecessors.

This hybrid pressure, lately analyzed in ANY.RUN’s safe sandbox, targets Home windows 10 and 11 techniques, encrypting information quickly and making an attempt lateral motion by way of SMB shares.

A Hybrid Menace Emerges from DragonForce Codebase

Nonetheless, its deployment seems experimental, with crucial flaws like self-encrypting ransom notes undermining its effectiveness.

Regardless of being flagged by most antivirus engines as DragonForce or Conti, deeper evaluation reveals DEVMAN’s separate infrastructure, together with a Devoted Leak Website (DLS) named “Devman’s Place,” claiming practically 40 victims primarily in Asia and Africa.

DEVMAN Ransomware
Encrypted file with the .DEVMAN extension 

DEVMAN’s conduct displays intriguing inconsistencies throughout working techniques and execution environments.

On Home windows 10, the ransomware efficiently alters desktop wallpapers to show ransom calls for, but it fails to take action on Home windows 11 for causes but to be decided.

Its encryption course of is notably aggressive, providing three modes full, header-only, and customized permitting attackers to prioritize pace or depth of affect.

Operational Challenges

A placing flaw in its builder logic ends in the encryption of its personal ransom notes, rendering them unreadable and successfully severing the communication channel for cost directions.

This crucial oversight, coupled with deterministic file renaming (e.g., ransom notes constantly renamed to “e47qfsnz2trbkhnt.devman”), suggests DEVMAN should still be in a testing section fairly than a cultured manufacturing risk.

Moreover, the ransomware operates primarily offline, with no exterior command-and-control (C2) communication noticed, relying as a substitute on native SMB probing to unfold inside networks.

DEVMAN Ransomware
Computerized detection labels the pattern as “DragonForce” 

Its use of Home windows Restart Supervisor to bypass file locks and hardcoded mutexes like “hsfjuukjzloqu28oajh727190” for execution coordination additional ties it to Conti-derived techniques, methods, and procedures (TTPs).

The pattern additionally demonstrates rudimentary persistence and evasion mechanisms, resembling deleting registry keys post-modification and checking for Shadow Copies to inhibit system restoration.

Whereas not groundbreaking in sophistication, these quirks present worthwhile insights into the evolving ransomware-as-a-service (RaaS) ecosystem, the place associates customise present frameworks like DragonForce to create spinoff variants.

DEVMAN’s emergence underscores the fragmented nature of contemporary ransomware improvement, the place code reuse and misconfigurations usually blur attribution strains.

Based on the Report, Safety groups leveraging instruments like ANY.RUN’s Interactive Sandbox can acquire real-time visibility into such threats, mapping behaviors, extracting indicators of compromise (IOCs), and enhancing response workflows regardless of the malware’s erratic execution.

Indicators of Compromise (IOCs)

Sort Worth
MD5 e84270afa3030b48dc9e0c53a35c65aa
SHA256 (Pattern 1) df5ab9015833023a03f92a797e20196672c1d6525501a9f9a94a45b0904c7403
SHA256 (Pattern 2) 018494565257ef2b6a4e68f1c3e7573b87fc53bd5828c9c5127f31d37ea964f8
File Identify (Mutex) hsfjuukjzloqu28oajh727190
File Identify (Observe) e47qfsnz2trbkhnt.devman

Discover this Information Fascinating! Observe us on Google Information, LinkedIn, and X to Get On the spot Updates

Tags: DEVMANDragonForceRansomwaretargetsUsersWindows
Admin

Admin

Next Post
The Finest ‘Marvel Snap’ Meta Decks – September 2024 Version – TouchArcade

The Finest ‘Marvel Snap’ Meta Decks – September 2024 Version – TouchArcade

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Trending.

Discover Vibrant Spring 2025 Kitchen Decor Colours and Equipment – Chefio

Discover Vibrant Spring 2025 Kitchen Decor Colours and Equipment – Chefio

May 17, 2025
Reconeyez Launches New Web site | SDM Journal

Reconeyez Launches New Web site | SDM Journal

May 15, 2025
Safety Amplified: Audio’s Affect Speaks Volumes About Preventive Safety

Safety Amplified: Audio’s Affect Speaks Volumes About Preventive Safety

May 18, 2025
Flip Your Toilet Right into a Good Oasis

Flip Your Toilet Right into a Good Oasis

May 15, 2025
Apollo joins the Works With House Assistant Program

Apollo joins the Works With House Assistant Program

May 17, 2025

TechTrendFeed

Welcome to TechTrendFeed, your go-to source for the latest news and insights from the world of technology. Our mission is to bring you the most relevant and up-to-date information on everything tech-related, from machine learning and artificial intelligence to cybersecurity, gaming, and the exciting world of smart home technology and IoT.

Categories

  • Cybersecurity
  • Gaming
  • Machine Learning
  • Smart Home & IoT
  • Software
  • Tech News

Recent News

Awakening Followers Are Combating A Useful resource Warfare With Containers

Awakening Followers Are Combating A Useful resource Warfare With Containers

July 9, 2025
Securing BYOD With out Sacrificing Privateness

Securing BYOD With out Sacrificing Privateness

July 9, 2025
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://techtrendfeed.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT

© 2025 https://techtrendfeed.com/ - All Rights Reserved