Ransom! VoiceTeam Call

Victim VoiceTeamCall reported a ransomware attack allegedly conducted by threat actor dragonforce, compromising their operations. The incident impacted the Dominican Republic, where VoiceTeam is headquartered.

Incident Details

  • Victim: VoiceTeam Call
  • Country:
  • Actor: dragonforce
  • Source: http://z3wqggtxft7id3ibr7srivv5gjof5fwg76slewnzwwakjuf3nlhukdid.onion/blog/?post_uuid=c8fe1a05-5f5d-4503-9a1e-d40eab2be63a
  • Discovered: 2025-12-08 13:42:45.958198
  • Published: 2025-12-08 13:26:58.753238

Information

  • VoiceTeam Call is a ransomware victim.
  • Operated by the actor DragonForce.
  • VoiceTeam is a leading nearshore provider of sales, customer service, and back-office support headquartered in Santiago, Dominican Republic with operations in San Francisco, California.
  • Offers experienced workforce providing customer service, high-performance sales, and detailed business processing support.
  • Employs agents who previously lived in the US with deep knowledge of American culture, setting them apart from outsourced providers in India and the Philippines.
  • Prioritizes quality, efficiency, and execution in its service delivery.
  • Maintains a quality assurance team that records 100% of all calls and chats from sales and customer service teams.
  • Provides two quality assurance checks on all projects for back-office support and digital work.
  • Services include customer acquisition, customer service, back-office support, and digital task support.
  • Demonstrates the ability to meet the evolving demands and challenges across multiple industry verticals.

Disclaimer: This post is based on public claims made by the ransomware group "dragonforce". I cannot confirm the accuracy of the information. However, I would be happy to share any official statement from the affected organization to provide clarification.

monitored by: ransomware.live