The DragonForce ransomware group has shifted from hacktivism to a profit-driven Ransomware-as-a-Service model, impacting major UK retail organizations. Recent attacks on M&S, Co-op, and Harrods demonstrate their growing capabilities and the serious cybersecurity risks they pose.
Affected: M&S, Co-op, Harrods
Affected: M&S, Co-op, Harrods
Keypoints
- DragonForce has transformed from hacktivists into a profit-driven Ransomware-as-a-Service (RaaS) operation, expanding their reach and impact.
- The group employs social engineering, including phishing, impersonation, and SIM swapping, to gain initial access to targeted organizations.
- Major UK retailers such as M&S, Co-op, and Harrods have been targeted, resulting in significant financial losses and operational disruptions.
- Victims face threats of data exfiltration and leakage through a double extortion strategy, increasing pressure to pay ransoms.
- Cyberattacks have led to online service disruptions, data breaches affecting millions, and restrictions on internet access in retail stores.
- Organizations are advised to strengthen verification protocols, train employees, conduct regular security audits, and develop incident response plans.
- Proactive cybersecurity measures and staff awareness are crucial to defending against evolving ransomware threats like DragonForce.
Views: 27