DragonForce - When Ransomware Meets Rebellion

  • Home |
  • DragonForce – When Ransomware Meets Rebellion
  • June 6, 2025

In the shadowy world of cybercrime, most ransomware groups have one thing on their minds: money. They're digital bandits, pure and simple encrypt your files, demand payment, job done. But every now and then, a group emerges that's playing an entirely different game. Meet DragonForce, the ransomware collective that's turned cyber extortion into political theatre.

More Than Just Another Ransomware Gang

What makes DragonForce particularly unsettling isn't just their technical prowess it's their ideological drive. Unlike their profit-obsessed peers, these actors blend sophisticated ransomware attacks with politically charged messaging that's designed to do more than just empty corporate coffers. They're out to shape public discourse, stir geopolitical tensions, and make a statement whilst they're at it.

In an era where international conflicts increasingly spill over into cyberspace, DragonForce represents something we're seeing more of: cybercrime with a cause. They don't just want your money they want to disrupt, to send a message, and to be heard.

Origins: A Storm from the East

First spotted in early 2023, DragonForce is believed to have roots in Southeast Asia or the Middle East. The group quickly made a name for itself by aligning with pro-Palestinian hacktivist movements, launching coordinated cyberattacks against Western financial institutions, government agencies, and defence-related organisations.
But here's where it gets interesting: their attacks aren't just about the technical damage. DragonForce combines destructive operations with carefully crafted political narratives, often leaking sensitive data specifically to inflame public sentiment and ratchet up geopolitical tensions.

Their ransomware notes and website defacements read like manifestos, peppered with ideological slogans and calls to action. It's a fascinating, and concerning blend of activism and extortion that blurs traditional boundaries between hacktivism and organised cybercrime.

Digital Vandalism with Purpose

Industries Under Fire

DragonForce has cast a remarkably wide net, striking across numerous sectors including:

  • Manufacturing and construction
  • Technology and retail
  • Finance and healthcare
  • Transportation and energy
  • Government services

It's this last point that really demonstrates their approach. They're not content to simply encrypt files and disappear. They want maximum visibility for their cause.

Geographic Reach

What started as politically motivated hacktivism has evolved into global financial extortion. The group has successfully targeted organisations across multiple continents, with particularly high-profile attacks in:

  • United States: Over 40 confirmed victims
  • United Kingdom: High-street giants including Marks & Spencer, Co-Op, and Harrods
  • Europe: Italy and Switzerland among the hardest hit
  • Other regions: Argentina, Australia, and beyond

The Australian Connection

Australia hasn't escaped DragonForce's attention, with several notable incidents highlighting their willingness to target both multinational corporations and niche local businesses:

  • Yakult Australia (December 2023): 95GB of sensitive employee data, including passports and contracts, was stolen and subsequently leaked.
  • Pressure Dynamics, WA (June 2025): This hydraulics and industrial engineering firm lost over 106GB of technical and corporate data in a targeted breach.
  • Aussizz Group (2024): The migration consultancy suffered a devastating attack resulting in nearly 300GB of visa applications and personal client data being compromised.

These incidents demonstrate that no organisation regardless of size or sector is beneath DragonForce's notice.

The Dragon's Technical Arsenal

DragonForce operates with impressive technical sophistication and operational discipline. Their toolkit spans the entire attack lifecycle, employing techniques that would make any cybersecurity professional's blood run cold:

Attack PhaseTechniqueMITRE ATT&CK ID
Initial AccessExploit Public-Facing ApplicationT1190
Initial AccessSpear-phishing AttachmentT1566.001
ExecutionPowerShellT1059.001
PersistenceScheduled TaskT1053.005
Privilege EscalationExploitation for Privilege EscalationT1068
Defence EvasionDisable or Modify ToolsT1562.001
Credential AccessLSASS Memory DumpingT1003.001
DiscoveryAccount DiscoveryT1087
Lateral MovementRemote Desktop ProtocolT1021.001
ExfiltrationExfiltration Over C2 ChannelT1041
ExfiltrationExfiltration to Cloud StorageT1567.002
ImpactData Encrypted for ImpactT1486
ImpactEndpoint Denial of ServiceT1499

Propaganda Meets Malware

Perhaps the most distinctive aspect of DragonForce operations is their ideological messaging. Their ransom notes aren't just demands for payment they're carefully crafted propaganda pieces that reference global conflicts, religious themes, and calls to resist what they term "digital imperialism."

This ideological component fundamentally changes the game. Negotiation isn't always possible when the attackers are as interested in making a political statement as they are in collecting ransom payments. Their operations are designed for maximum exposure and symbolic impact, making them particularly unpredictable adversaries.

The Wider View: Growing Cyber Threats and Supplier Risks in Australia

DragonForce represents something we're going to see much more of: hybrid threat groups that seamlessly blend geopolitical motives with cyber extortion. Their emergence serves as a stark warning that geopolitical events and cyber threats are now inextricably linked.

For organisations and cybersecurity professionals, this evolution means rethinking threat models entirely. It's no longer sufficient to prepare for attacks motivated purely by financial gain. Modern defenders must anticipate threats driven by:

  • Symbolic targeting: Attacks chosen for maximum political or ideological impact
  • Public relations warfare: Breaches designed to generate media attention and public discourse
  • Geopolitical opportunism: Threat actors exploiting international tensions for operational advantage

The New Reality

DragonForce's rise signals a fundamental shift in the cyber threat landscape. Cybersecurity is no longer just an IT issue it's become a matter of international relations. As global tensions continue to manifest in digital spaces, organisations must prepare for adversaries who view their networks not just as sources of profit, but as platforms for ideological warfare.

The dragons are breathing fire into cyberspace, and they're not going away anytime soon. The question isn't whether your organisation might become a target it's whether you're prepared for adversaries who are fighting for more than just money.

In this new era of hybrid threats, understanding your adversary's motivations might be just as important as understanding their technical capabilities. After all, you can't effectively defend against an enemy whose goals you don't comprehend.