{"id":2794,"date":"2025-05-24T13:43:59","date_gmt":"2025-05-24T13:43:59","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=2794"},"modified":"2025-05-24T13:43:59","modified_gmt":"2025-05-24T13:43:59","slug":"dragonforce-targets-rivals-in-a-play-for-dominance-sophos-information","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=2794","title":{"rendered":"DragonForce targets rivals in a play for dominance \u2013 Sophos Information"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><span data-contrast=\"none\">DragonForce isn&#8217;t just one other ransomware model \u2013 it\u2019s a destabilizing drive making an attempt to reshape the ransomware panorama. Counter Menace Unit (CTU) researchers are actively monitoring the evolution of the menace posed by the group.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h3>Enter the dragon<\/h3>\n<p><span data-contrast=\"none\">DragonForce is concerned in high-impact assaults concentrating on each conventional IT infrastructure and virtualized environments (e.g., VMware ESXi), with a robust emphasis on credential theft, Energetic Listing abuse, and knowledge exfiltration. In March 2025, it launched efforts to assert dominance within the ransomware ecosystem by introducing a extra versatile affiliate mannequin and concentrating on different ransomware teams.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">A collection of <\/span><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.bbc.com\/news\/articles\/c62x4zxe418o\"><span data-contrast=\"none\">assaults<\/span><\/a><span data-contrast=\"none\"> on UK retailers that started in late April introduced this group into sharper focus as third-party <\/span><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.theguardian.com\/technology\/2025\/may\/01\/how-native-english-scattered-spider-group-linked-to-ms-attack-operate\"><span data-contrast=\"none\">reviews<\/span><\/a><span data-contrast=\"none\"> linked these assaults to DragonForce and the <\/span><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.secureworks.com\/research\/threat-profiles\/gold-harvest\"><span data-contrast=\"none\">GOLD HARVEST<\/span><\/a><span data-contrast=\"none\"> (also referred to as Scattered Spider) menace group. GOLD HARVEST regularly leverages social engineering, abuse of distant monitoring and administration (RMM) instruments, and multi-factor authentication (MFA) bypass strategies to realize entry, steal bulk knowledge, and typically deploy ransomware.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">When DragonForce emerged in August 2023, it provided a standard RaaS scheme.\u202fOn March 19, 2025, the group introduced a rebrand as a \u2018cartel\u2019 to increase its attain, hoping to emulate the success of LockBit and different mature ransomware-as-a-service (RaaS) teams. In observe, it isn\u2019t a cartel operation however an providing that offers associates the flexibleness to leverage DragonForce\u2019s infrastructure and ransomware instruments whereas working underneath their very own manufacturers (see Determine 1).<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/05\/df-fig01.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-961150\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/05\/df-fig01.png\" alt=\"A screen capture of the 19 March 2025 announcement; the intro reads &quot;Today I would like to present to you our new direction, we are starting to work in a new vein, according to a new principle. You no longer have to work under our brand, now you can create your own brand under the auspices of an already proven partner time! We the DragonForce Ransomware cartel present to you 'projects' now you create yourself.&quot;\" width=\"535\" height=\"314\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/05\/df-fig01.png 535w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/05\/df-fig01.png?resize=300,176 300w\" sizes=\"auto, (max-width: 535px) 100vw, 535px\"\/><\/a><\/p>\n<p><i><span data-contrast=\"none\">Determine <\/span><\/i><i><span data-contrast=\"none\">1<\/span><\/i><i><span data-contrast=\"none\">: Commercial for the DragonForce cartel<\/span><\/i><\/p>\n<p><span data-contrast=\"none\">DragonForce didn\u2019t simply revamp its enterprise mannequin; it started attacking rival operations. The \u2018cartel\u2019 submit coincided with defacements of leak websites operated by the BlackLock and Mamona ransomware teams. The defacements appeared to have been performed by DragonForce, as seen within the side-by-side display screen captures in Determine 2.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/05\/df-fig02.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-961151\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/05\/df-fig02.png\" alt=\"Two screens showing the BlackLock and Mamona defacements as described in text\" width=\"640\" height=\"375\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/05\/df-fig02.png 730w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/05\/df-fig02.png?resize=300,176 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\"\/><\/a><\/p>\n<p><i><span data-contrast=\"none\">Determine <\/span><\/i><i><span data-contrast=\"none\">2<\/span><\/i><i><span data-contrast=\"none\">: Defaced Mamona (left) and BlackLock (proper) leak websites<\/span><\/i><\/p>\n<p><span data-contrast=\"none\">In April, a submit on the RansomHub leak website appeared to advertise the DragonForce cartel, as seen in Determine 3. A DragonForce submit on the RAMP underground discussion board additionally appeared to point that the teams had been working collectively, however the postscript instructed that RansomHub won&#8217;t help the collaboration (see Determine 4). RansomHub is among the most prolific teams to emerge following the LockBit <\/span><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.secureworks.com\/blog\/lockbit-in-action\"><span data-contrast=\"none\">disruption<\/span><\/a><span data-contrast=\"none\"> and ALPHV (also referred to as BlackCat) demise in 2024.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/05\/df-fig03.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-961152\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/05\/df-fig03.png\" alt=\"A screen capture showing the DragonForce mention on RansomHub as described in text\" width=\"396\" height=\"721\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/05\/df-fig03.png 396w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/05\/df-fig03.png?resize=165,300 165w\" sizes=\"auto, (max-width: 396px) 100vw, 396px\"\/><\/a><\/p>\n<p><em><span class=\"TextRun SCXW246309976 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW246309976 BCX0\" data-ccp-parastyle=\"caption\">Determine <\/span><\/span><span class=\"FieldRange SCXW246309976 BCX0\"><span class=\"TextRun SCXW246309976 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW246309976 BCX0\" data-ccp-parastyle=\"caption\">3<\/span><\/span><\/span><span class=\"TextRun SCXW246309976 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW246309976 BCX0\" data-ccp-parastyle=\"caption\">:<\/span> <span class=\"NormalTextRun SCXW246309976 BCX0\" data-ccp-parastyle=\"caption\">DragonForce<\/span><span class=\"NormalTextRun SCXW246309976 BCX0\" data-ccp-parastyle=\"caption\"> cartel point out on <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW246309976 BCX0\" data-ccp-parastyle=\"caption\">RansomHub<\/span><span class=\"NormalTextRun SCXW246309976 BCX0\" data-ccp-parastyle=\"caption\"> leak website<\/span><\/span><\/em><\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/05\/df-fig04.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-961153\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/05\/df-fig04.png\" alt=\"A screen capture showing the &quot;collaboration&quot; -- text reads &quot;DragonForce &amp; RansomHub -- Hi. Don't worry RansomHub will be up soon, they just decided to move to our infrastructure! We are reliable partners. A good example of how 'projects' work, a new option from The DragonForce Ransomware Cartel!&quot; A postscript at the bottom reads &quot;P.S. -- RansomHub hope you are doing well, consider our offer! We are waiting for everyone in our ranks.&quot;\" width=\"640\" height=\"377\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/05\/df-fig04.png 1244w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/05\/df-fig04.png?resize=300,177 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/05\/df-fig04.png?resize=768,452 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/05\/df-fig04.png?resize=1024,603 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\"\/><\/a><\/p>\n<p><i><span data-contrast=\"none\">Determine <\/span><\/i><i><span data-contrast=\"none\">4<\/span><\/i><i><span data-contrast=\"none\">: DragonForce submit suggesting a collaboration with RansomHub<\/span><\/i><\/p>\n<p><span data-contrast=\"none\">Shortly after these posts, the RansomHub leak website went offline. The homepage displayed the message \u201cRansomHub R.I.P 03\/03\/2025.\u201d The \u201ccollaboration\u201d between DragonForce and RansomHub seems to have been extra of a hostile takeover by DragonForce. The \u2018koley\u2019 persona, who is understood to be a outstanding RansomHub member, posted a defacement of the DragonForce homepage on RAMP (see Determine 5), together with the message \u201c@dragonforce guess you&#8217;ve traitors\u2026\u201d Further posts by koley accused DragonForce of working with legislation enforcement, attacking rivals, and telling lies.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/05\/df-fig05.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-961154\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/05\/df-fig05.jpg\" alt=\"An image showing a crossed-out DragonForce logo and three derpy-looking cartoon dragons\" width=\"640\" height=\"447\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/05\/df-fig05.jpg 891w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/05\/df-fig05.jpg?resize=300,210 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/05\/df-fig05.jpg?resize=768,537 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\"\/><\/a><\/p>\n<p><i><span data-contrast=\"none\">Determine <\/span><\/i><i><span data-contrast=\"none\">5<\/span><\/i><i><span data-contrast=\"none\">: Defacement of the DragonForce leak website shared by RansomHub member \u2018koley\u2019<\/span><\/i><\/p>\n<p><span data-contrast=\"none\">As of this publication, the DragonForce leak website is again on-line after an prolonged interval of down time. Throughout that interval, the homepage displayed a message stating that it might be up once more quickly, and the same message seems on the RansomBay leak website (see Determine 6).<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/05\/df-fig06.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-961155\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/05\/df-fig06.png\" alt=\"A pair of images; on the left, DragonForce announcement reads &quot;We will be up soon -- Our blog and files server will be up on 29.04.2025 00:00 UTC Thank you for your patience.&quot; On the right, the RansomHub announcement reads &quot;Went on a journey... We're still in search for a pirates!&quot;\" width=\"576\" height=\"173\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/05\/df-fig06.png 576w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/05\/df-fig06.png?resize=300,90 300w\" sizes=\"auto, (max-width: 576px) 100vw, 576px\"\/><\/a><\/p>\n<p><i><span data-contrast=\"none\">Determine <\/span><\/i><i><span data-contrast=\"none\">6<\/span><\/i><i><span data-contrast=\"none\">: DragonForce and RansomBay leak website homepages as of Could 2, 2025<\/span><\/i><\/p>\n<p><span data-contrast=\"none\">In Could 2025, UK retailer Marks and Spencer was the topic of a major cyberattack that was <\/span><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/marks-and-spencer-breach-linked-to-scattered-spider-ransomware-attack\/\"><span data-contrast=\"none\">publicly attributed<\/span><\/a><span data-contrast=\"none\"> to GOLD HARVEST (referred to within the reporting as Scattered Spider), though this attribution has not been formally confirmed. <\/span><span data-contrast=\"none\">This group is<\/span><span data-contrast=\"none\"> a loosely organized cybercriminal collective made up of particular person menace actors who collaborate by a shared community of underground boards and encrypted chat channels utilized by a group of like-minded people often called \u201cThe Com.\u201d The menace actors on this group coordinate malicious companies to conduct assaults, alternate instruments, and share ways inside this decentralized ecosystem. GOLD HARVEST reportedly deployed the DragonForce ransomware on this assault.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">GOLD HARVEST has been recognized to function as a ransomware affiliate, deploying ALPHV ransomware in <\/span><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.reuters.com\/business\/mgm-expects-cybersecurity-issue-negatively-impact-third-quarter-earnings-2023-10-05\/\"><span data-contrast=\"none\">assaults<\/span><\/a><span data-contrast=\"none\"> on MGM Resorts in 2023 and <\/span><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/reliaquest.com\/blog\/scattered-spider-x-ransomhub-a-new-partnership\/\"><span data-contrast=\"none\">reportedly<\/span><\/a><span data-contrast=\"none\"> utilizing RansomHub in assaults all through 2024. The menace actors make the most of a variety of ways, strategies, and procedures (TTPs) of their assaults however are recognized for his or her efficient use of social engineering. They usually achieve entry to organizations by concentrating on IT assist desks. Public attribution of the Marks and Spencer assault could also be predicated on the assumption that the assault began with social engineering, maybe concentrating on assist desk employees.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Social engineering is a common menace throughout the cyber panorama and isn&#8217;t distinctive to GOLD HARVEST, though the group has been adept at utilizing this method through e mail and phone calls. There may be rising interaction between social engineering and stolen credentials. GOLD HARVEST is <\/span><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa23-320a\"><span data-contrast=\"none\">recognized<\/span><\/a><span data-contrast=\"none\"> to make use of commodity infostealers equivalent to Vidar and Raccoon, which acquire browser-saved passwords, cookies, and session tokens. These credentials can allow preliminary entry straight or help extra convincing social engineering makes an attempt by permitting attackers to reference inside programs or mimic legit worker habits.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">DragonForce has <\/span><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.bbc.co.uk\/news\/articles\/crkx3vy54nzo.amp\"><span data-contrast=\"none\">claimed<\/span><\/a><span data-contrast=\"none\"> two assaults impacting UK retailers. These assaults spotlight the necessity for vigilance by corporations within the retail sector. The interior warfare amongst ransomware teams is disruptive to their very own operations however doesn\u2019t scale back threat to organizations. In truth, it might result in extra erratic, opportunistic assaults as teams scramble to claim dominance and monetize stolen knowledge in new methods. Organizations should due to this fact revisit their incident response, menace intelligence, and third-party threat administration methods to stay resilient in an more and more chaotic menace surroundings.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h3>Suggestions for defenders<\/h3>\n<p><span data-contrast=\"none\">Whereas technical controls stay important for detecting and mitigating GOLD HARVEST and DragonForce exercise, they should be strengthened by robust inside processes and constant human vigilance. These assaults reinforce that technical compromises usually start with social compromise. Conversations are regularly the preliminary level of compromise, not exploits. Organizations should scale back their publicity to social engineering by combining technical controls with procedural self-discipline. CTU researchers suggest that organizations take the next actions to mitigate the dangers of those assaults:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"22\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Deploy browser isolation and password managers to forestall harvesting of saved credentials.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"22\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">Implement endpoint detection for infostealer exercise, together with credential and session cookie theft.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"22\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"none\">Make the most of an id monitoring resolution that makes use of darkish net sources and menace intel feeds to constantly monitor for compromised credentials.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"22\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"none\">Implement strict id verification protocols for IT help and assist desk interactions.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"22\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"5\" data-aria-level=\"1\"><span data-contrast=\"none\">Set up clear escalation paths to empower front-line employees to withstand uncommon or pressing requests till they are often verified.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"22\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"6\" data-aria-level=\"1\"><span data-contrast=\"none\">Conduct common tabletop workout routines that simulate social engineering and insider menace situations.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul><\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>DragonForce isn&#8217;t just one other ransomware model \u2013 it\u2019s a destabilizing drive making an attempt to reshape the ransomware panorama. Counter Menace Unit (CTU) researchers are actively monitoring the evolution of the menace posed by the group.\u00a0\u00a0 Enter the dragon DragonForce is concerned in high-impact assaults concentrating on each conventional IT infrastructure and virtualized environments [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2796,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[2698,1753,121,1152,2374,120,303],"class_list":["post-2794","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-dominance","tag-dragonforce","tag-news","tag-play","tag-rivals","tag-sophos","tag-targets"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/2794","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2794"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/2794\/revisions"}],"predecessor-version":[{"id":2795,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/2794\/revisions\/2795"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/2796"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2794"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2794"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2794"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-14 23:45:08 UTC -->