Site icon Check Point Blog

DragonForce Ransomware: Redefining Hybrid Extortion in 2025

The ransomware world isn’t just evolving—it’s fragmenting, decentralizing, and growing more dangerous. In this volatile landscape, DragonForce is emerging as one of the most intriguing and threatening actors of 2025. Born from possible hacktivist roots and now fully immersed in the economics of cyber crime, DragonForce represents a new era of hybrid threats: ideologically ambiguous, technologically agile, and fiercely opportunistic.

A Ransomware Group Built for the Gig Economy

DragonForce first appeared in December 2023 with the launch of its “DragonLeaks” dark web portal. Some researchers trace its lineage to DragonForce Malaysia, a long-standing hacktivist collective. But its current trajectory is far from purely ideological.

By 2025, DragonForce has matured into a ransomware group with a business model tailored to attract displaced or freelance affiliates. Key features include:

Following the April 2025 disappearance of RansomHub, DragonForce moved quickly to absorb its affiliates, pitching itself as an agile alternative to collapsed legacy operators. In a world where trust in big-name RaaS brands is eroding, DragonForce offers anonymity, flexibility, and profit.

Ransomware in 2025: A Historic Surge

DragonForce’s rise is happening during a record-breaking spike in global ransomware activity. According to Check Point’s State of Ransomware Q1 2025 report:

Ransomware isn’t just growing in volume. It’s also mutating in method. Many groups increasingly focus on data extortion without encryption, reducing operational complexity and accelerating monetization.

Retail in the Crosshairs: UK Under Siege

In April and May 2025, DragonForce launched a campaign targeting high-profile UK retailers. These attacks triggered multi-day outages of e-commerce platforms, loyalty programs, and internal operations. And the campaign may reflect a broader strategic pivot: away from ransom only income, toward harvesting high-volume PII for secondary monetization.

Check Point data confirms the trend. The consumer goods & services sector (which includes retail) is now the 5th most attacked vertical in the UK, experiencing:

This aligns with broader ransomware targeting preferences—particularly for groups like Cl0p, which also show a disproportionate focus on this vertical.

A Fragmented Ecosystem Feeding the Fire

DragonForce isn’t the only one adapting. With LockBit and ALPHV dismantled by law enforcement in 2024, the ransomware ecosystem has fragmented:

DragonForce stands out by merging the simplicity of a platform with the influence of a movement. It offers not just tools, but identity and alignment—however vague or flexible that may be.

AI, Automation, and Ransomware’s Next Act

Check Point’s 2025 reports also note a chilling trend: the increased use of AI in malware development and campaign scaling.

This trend is accelerating the professionalization of ransomware operations. It also makes defenders’ jobs exponentially harder.

Infinity Protection: Built for the Threats of Now

Check Point is meeting this moment with AI-powered, prevention-first cyber security:

In a threat landscape defined by ransomware, fake branding, and AI-powered automation, only real-time, consolidated security intelligence can keep organizations ahead.

Conclusion: Ransomware-as-a-Service, Crime as a Brand

DragonForce isn’t just a ransomware gang—it’s a marketing strategy, a business model, and an ecosystem all rolled into one. And that makes it more dangerous than most. Its success lies not in technical sophistication, but in lowering the barrier to cyber crime, in giving ex-affiliates a home, in letting new actors build personal brands, and in capitalizing on a world still struggling to adapt to the ransomware-as-a-service reality. The future of ransomware is decentralized, automated, and disturbingly accessible.

Exit mobile version