Article Details
Scrape Timestamp (UTC): 2025-05-27 23:13:07.787
Original Article Text
Click to Toggle View
DragonForce ransomware abuses SimpleHelp in MSP supply chain attack. The DragonForce ransomware operation successfully breached a managed service provider and used its SimpleHelp remote monitoring and management (RMM) platform to steal data and deploy encryptors on downstream customers' systems. Sophos was brought in to investigate the attack and believe the threat actors exploited a chain of older SimpleHelp vulnerabilities tracked as CVE-2024-57727, CVE-2024-57728, and CVE-2024-57726 to breach the system. SimpleHelp is a commercial remote support and access tool commonly used by MSPs to manage systems and deploy software across customer networks. The report by Sophos says that the threat actors first used SimpleHelp to perform reconnaissance on customer systems, such as collecting information about the MSP's customers, including device names and configuration, users, and network connections. The threat actors then attempted to steal data and deploy decryptors on customer networks, which were blocked on one of the networks using Sophos endpoint protection. However, the other customers were not so lucky, with devices encrypted and data stolen for double-extortion attacks. Sophos has shared IOCs related to this attack to help organizations better defend their networks. MSPs have long been a valuable target for ransomware gangs, as a single breach can lead to attacks on multiple companies. Some ransomware affiliates have specialized in tools commonly used by MSPs, such as SimpleHelp, ConnectWise ScreenConnect, and Kaseya. This has led to devastating attacks, including REvil's massive ransomware attack on Kaseya, which impacted over 1,000 companies. DragonForce gains notoriety following UK retail attacks The DragonForce ransomware gang has recently surged in notoriety after being linked to a wave of high-profile retail breaches involving threat actors utilizing Scattered Spider tactics. As first reported by BleepingComputer, the group's ransomware was deployed in attacks on the United Kingdom retailer Marks & Spencer. Soon after, the same threat actors breached another UK retailer, Co-op, who confirmed a significant amount of customer data was stolen. BleepingComputer previously reported that DragonForce is trying to build a "cartel" by offering a white-label ransomware-as-a-service (RaaS) model, allowing affiliates to deploy rebranded versions of its encryptor. With its increasingly affiliate-friendly approach and growing list of victims, DragonForce is quickly becoming a major player in the ransomware landscape. Top 10 MITRE ATT&CK© Techniques Behind 93% of Attacks Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.
Daily Brief Summary
DragonForce ransomware breached a managed service provider by exploiting vulnerabilities in the SimpleHelp tool.
The attackers used SimpleHelp for reconnaissance, gathering vital information about MSP customers, including device names, configurations, and network details.
Successive data theft and ransomware deployment affected several downstream customers, leading to double-extortion scenarios.
Sophos, the cybersecurity firm, was enlisted to investigate and mitigate the impact, identifying older vulnerabilities exploited by the attackers.
Protective measures by Sophos blocked some attacks, but other customers experienced device encryption and loss of sensitive data.
Significant ransomware incidents continue with DragonForce targeting major UK retailers, with substantial customer data breaches reported.
Increased affiliation strategies and ransomware-as-a-service offerings by DragonForce indicate a shift towards a 'cartel' model aiming for broader impact across industries.