05-15-2024, 04:25 PM
News DragonForce Cyberattack Strikes Again: Malone & Co and Watt Carmicheal Added as
<p><img width="1000" height="485" src="https://thecyberexpress.com/wp-content/uploads/DragonForce-cyberattack-e1715772548435.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="DragonForce cyberattack" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/DragonForce-cyberattack-e1715772548435.webp 1000w, https://thecyberexpress.com/wp-content/u...0x146.webp 300w, https://thecyberexpress.com/wp-content/u...8x372.webp 768w, https://thecyberexpress.com/wp-content/u...0x291.webp 600w, https://thecyberexpress.com/wp-content/u...50x73.webp 150w, https://thecyberexpress.com/wp-content/u...0x364.webp 750w" sizes="(max-width: 1000px) 100vw, 1000px" /></p><span style="font-weight: 400;">The notorious DragonForce ransomware group has expanded its list of victims, adding two new names to their dark web portal — Malone & Co and Watt Carmicheal. In a dark web post on their platform, the threat actor boasted about their latest conquests. </span>
<span style="font-weight: 400;">The first victim, Malone & Co, a prominent accounting firm based in Ireland, seemed to have fallen prey to the DragonForce cyberattack. The post provided details about the company's services and location, indicating a breach of sensitive information.</span>
<span style="font-weight: 400;">Similarly, Watt Carmichael, a reputable investment management firm in Toronto, Canada, found itself ensnared in a similar situation by the DragonForce <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-ransomware-how-it-work/" target="_blank" rel="noopener" title="ransomware" data-wpil-keyword-link="linked" data-wpil-monitor-id="3995">ransomware</a> attack. However, despite their claims, both the cyberattacks are unverified.</span>
<h2><span style="font-weight: 400;">DragonForce Cyberattack Targets Two New Victims</span></h2>
<span style="font-weight: 400;"><a href="https://thecyberexpress.com/" target="_blank" rel="noopener">The Cyber Express</a> has reached out to both organizations to learn more about this alleged DragonForce cyberattack. However, at the time of writing this, no official statement or response has been shared, leaving the claims for the <a href="https://cyble.com/blog/lockbit-blacks-legacy-unraveling-the-dragonforce-ransomware-connection/" target="_blank" rel="nofollow noopener">DragonForce ransomware</a> attack unverified. </span>
[caption id="attachment_68487" align="alignnone" width="355"]<img class="wp-image-68487 size-full" src="https://thecyberexpress.com/wp-content/uploads/DragonForce-Cyberattack.webp" alt="DragonForce Cyberattack" width="355" height="703" /> Source: X[/caption]
<span style="font-weight: 400;">Interestingly, both victims' websites remain operational, showing no immediate signs of the cyberattacks. This discrepancy adds another layer of mystery to the unfolding situation. </span>
<span style="font-weight: 400;">Moreover, along with the <a class="wpil_keyword_link" title="cyberattack" href="https://thecyberexpress.com/what-is-a-cyber-attack/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3976">cyberattack</a> post, the DragonForce ransomware group stated that it had access to 15.34 GB of data associated with Malone & Co. The hacker group has shared a deadline of 16 days before the data gets published. </span>
[caption id="attachment_68490" align="alignnone" width="353"]<img class="wp-image-68490 size-full" src="https://thecyberexpress.com/wp-content/uploads/DragonForce-Ransomware-attack.webp" alt="DragonForce Ransomware" width="353" height="704" /> Source: X[/caption]
<span style="font-weight: 400;">As for the second alleged victim, Watt Carmicheal, the hacker group claims access to 27.3 GB of data, and no ransom deadline was shared. The threat actor, DragonForce, has used the same <a href="https://thecyberexpress.com/infiniti-usa-cyberattack-by-mogilevich/" target="_blank" rel="noopener">modus operandi</a> to target similar victims in the past. </span>
<h2><span style="font-weight: 400;">Who is the DragonForce Ransomware Group?</span></h2>
<span style="font-weight: 400;">DragonForce, a hacktivist group hailing from Malaysia, is infamous for its relentless cyberattacks on government institutions and commercial entities, primarily in India. Their targets extend beyond geographical borders, with a particular focus on websites affiliated with Israel while advocating for pro-Palestinian causes.</span>
<span style="font-weight: 400;">Utilizing a variety of tactics such as defacement attacks, distributed <a href="https://thecyberexpress.com/web-ddos-tsunamis-and-strategies-for-defense/" target="_blank" rel="noopener">denial-of-service (DDoS) attacks</a>, and data leaks, DragonForce demonstrates a high level of adaptability and sophistication in their operations. This versatility has enabled them to evolve their strategies over time, staying one step ahead of their adversaries.</span>
<span style="font-weight: 400;">Embracing their role as vigilantes for the people, DragonForce Malaysia boldly proclaims its mission on various online platforms, including social media giants like Facebook, YouTube, and X (formerly Twitter). Through these channels, they amplify their voice, connecting with like-minded individuals and fostering a sense of community among Malaysian <a href="https://thecyberexpress.com/odin-by-cyble-cve-cybersecurity-search/" target="_blank" rel="noopener">cybersecurity enthusiasts</a>.</span>
<span style="font-weight: 400;">Central to DragonForce's ideology is their staunch advocacy for the Palestinian cause. Their actions speak volumes, from high-profile hacks targeting Israeli networks to broadcasting messages of solidarity through unconventional mediums like <a href="https://thecyberexpress.com/tiktok-fined-for-misusing-children-data/" target="_blank" rel="noopener">TikTok</a>.</span>
<span style="font-weight: 400;">Despite their formidable capabilities, DragonForce does not operate in isolation. Collaborative efforts with other local hacker threat groups have been reported, highlighting the interconnected nature of the hacktivist groups.</span>
<span style="color: #ff0000;"><i><span style="font-weight: 400;">Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. <a style="color: #ff0000;" href="https://thecyberexpress.com/" target="_blank" rel="noopener">The Cyber Express</a> assumes no liability for the accuracy or consequences of using this information.</span></i></span>
https://thecyberexpress.com/dragonforce-...w-victims/
<p><img width="1000" height="485" src="https://thecyberexpress.com/wp-content/uploads/DragonForce-cyberattack-e1715772548435.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="DragonForce cyberattack" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/DragonForce-cyberattack-e1715772548435.webp 1000w, https://thecyberexpress.com/wp-content/u...0x146.webp 300w, https://thecyberexpress.com/wp-content/u...8x372.webp 768w, https://thecyberexpress.com/wp-content/u...0x291.webp 600w, https://thecyberexpress.com/wp-content/u...50x73.webp 150w, https://thecyberexpress.com/wp-content/u...0x364.webp 750w" sizes="(max-width: 1000px) 100vw, 1000px" /></p><span style="font-weight: 400;">The notorious DragonForce ransomware group has expanded its list of victims, adding two new names to their dark web portal — Malone & Co and Watt Carmicheal. In a dark web post on their platform, the threat actor boasted about their latest conquests. </span>
<span style="font-weight: 400;">The first victim, Malone & Co, a prominent accounting firm based in Ireland, seemed to have fallen prey to the DragonForce cyberattack. The post provided details about the company's services and location, indicating a breach of sensitive information.</span>
<span style="font-weight: 400;">Similarly, Watt Carmichael, a reputable investment management firm in Toronto, Canada, found itself ensnared in a similar situation by the DragonForce <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-ransomware-how-it-work/" target="_blank" rel="noopener" title="ransomware" data-wpil-keyword-link="linked" data-wpil-monitor-id="3995">ransomware</a> attack. However, despite their claims, both the cyberattacks are unverified.</span>
<h2><span style="font-weight: 400;">DragonForce Cyberattack Targets Two New Victims</span></h2>
<span style="font-weight: 400;"><a href="https://thecyberexpress.com/" target="_blank" rel="noopener">The Cyber Express</a> has reached out to both organizations to learn more about this alleged DragonForce cyberattack. However, at the time of writing this, no official statement or response has been shared, leaving the claims for the <a href="https://cyble.com/blog/lockbit-blacks-legacy-unraveling-the-dragonforce-ransomware-connection/" target="_blank" rel="nofollow noopener">DragonForce ransomware</a> attack unverified. </span>
[caption id="attachment_68487" align="alignnone" width="355"]<img class="wp-image-68487 size-full" src="https://thecyberexpress.com/wp-content/uploads/DragonForce-Cyberattack.webp" alt="DragonForce Cyberattack" width="355" height="703" /> Source: X[/caption]
<span style="font-weight: 400;">Interestingly, both victims' websites remain operational, showing no immediate signs of the cyberattacks. This discrepancy adds another layer of mystery to the unfolding situation. </span>
<span style="font-weight: 400;">Moreover, along with the <a class="wpil_keyword_link" title="cyberattack" href="https://thecyberexpress.com/what-is-a-cyber-attack/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3976">cyberattack</a> post, the DragonForce ransomware group stated that it had access to 15.34 GB of data associated with Malone & Co. The hacker group has shared a deadline of 16 days before the data gets published. </span>
[caption id="attachment_68490" align="alignnone" width="353"]<img class="wp-image-68490 size-full" src="https://thecyberexpress.com/wp-content/uploads/DragonForce-Ransomware-attack.webp" alt="DragonForce Ransomware" width="353" height="704" /> Source: X[/caption]
<span style="font-weight: 400;">As for the second alleged victim, Watt Carmicheal, the hacker group claims access to 27.3 GB of data, and no ransom deadline was shared. The threat actor, DragonForce, has used the same <a href="https://thecyberexpress.com/infiniti-usa-cyberattack-by-mogilevich/" target="_blank" rel="noopener">modus operandi</a> to target similar victims in the past. </span>
<h2><span style="font-weight: 400;">Who is the DragonForce Ransomware Group?</span></h2>
<span style="font-weight: 400;">DragonForce, a hacktivist group hailing from Malaysia, is infamous for its relentless cyberattacks on government institutions and commercial entities, primarily in India. Their targets extend beyond geographical borders, with a particular focus on websites affiliated with Israel while advocating for pro-Palestinian causes.</span>
<span style="font-weight: 400;">Utilizing a variety of tactics such as defacement attacks, distributed <a href="https://thecyberexpress.com/web-ddos-tsunamis-and-strategies-for-defense/" target="_blank" rel="noopener">denial-of-service (DDoS) attacks</a>, and data leaks, DragonForce demonstrates a high level of adaptability and sophistication in their operations. This versatility has enabled them to evolve their strategies over time, staying one step ahead of their adversaries.</span>
<span style="font-weight: 400;">Embracing their role as vigilantes for the people, DragonForce Malaysia boldly proclaims its mission on various online platforms, including social media giants like Facebook, YouTube, and X (formerly Twitter). Through these channels, they amplify their voice, connecting with like-minded individuals and fostering a sense of community among Malaysian <a href="https://thecyberexpress.com/odin-by-cyble-cve-cybersecurity-search/" target="_blank" rel="noopener">cybersecurity enthusiasts</a>.</span>
<span style="font-weight: 400;">Central to DragonForce's ideology is their staunch advocacy for the Palestinian cause. Their actions speak volumes, from high-profile hacks targeting Israeli networks to broadcasting messages of solidarity through unconventional mediums like <a href="https://thecyberexpress.com/tiktok-fined-for-misusing-children-data/" target="_blank" rel="noopener">TikTok</a>.</span>
<span style="font-weight: 400;">Despite their formidable capabilities, DragonForce does not operate in isolation. Collaborative efforts with other local hacker threat groups have been reported, highlighting the interconnected nature of the hacktivist groups.</span>
<span style="color: #ff0000;"><i><span style="font-weight: 400;">Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. <a style="color: #ff0000;" href="https://thecyberexpress.com/" target="_blank" rel="noopener">The Cyber Express</a> assumes no liability for the accuracy or consequences of using this information.</span></i></span>
https://thecyberexpress.com/dragonforce-...w-victims/