Article Details
Scrape Timestamp (UTC): 2025-05-27 21:48:37.793
Original Article Text
Click to Toggle View
DragonForce ransomware abuses MSP’s SimpleHelp RMM to encrypt customers. The DragonForce ransomware operation successfully breached a managed service provider and used its SimpleHelp remote monitoring and management (RMM) platform to steal data and deploy encryptors on downstream customers' systems. Sophos was brought in to investigate the attack and believe the threat actors exploited a chain of older SimpleHelp vulnerabilities tracked as CVE-2024-57727, CVE-2024-57728, and CVE-2024-57726 to breach the system. SimpleHelp is a commercial remote support and access tool commonly used by MSPs to manage systems and deploy software across customer networks. The report by Sophos says that the threat actors first used SimpleHelp to perform reconnaissance on customer systems, such as collecting information about the MSP's customers, including device names and configuration, users, and network connections. The threat actors then attempted to steal data and deploy decryptors on customer networks, which were blocked on one of the networks using Sophos endpoint protection. However, the other customers were not so lucky, with devices encrypted and data stolen for double-extortion attacks. Sophos has shared IOCs related to this attack to help organizations better defend their networks. MSPs have long been a valuable target for ransomware gangs, as a single breach can lead to attacks on multiple companies. Some ransomware affiliates have specialized in tools commonly used by MSPs, such as SimpleHelp, ConnectWise ScreenConnect, and Kaseya. This has led to devastating attacks, including REvil's massive ransomware attack on Kaseya, which impacted over 1,000 companies. DragonForce gains notoriety following UK retail attacks The DragonForce ransomware gang has recently surged in notoriety after being linked to a wave of high-profile retail breaches involving threat actors utilizing Scattered Spider tactics. As first reported by BleepingComputer, the group's ransomware was deployed in attacks on the United Kingdom retailer Marks & Spencer. Soon after, the same threat actors breached another UK retailer, Co-op, who confirmed a significant amount of customer data was stolen. BleepingComputer previously reported that DragonForce is trying to build a "cartel" by offering a white-label ransomware-as-a-service (RaaS) model, allowing affiliates to deploy rebranded versions of its encryptor. With its increasingly affiliate-friendly approach and growing list of victims, DragonForce is quickly becoming a major player in the ransomware landscape. Top 10 MITRE ATT&CK© Techniques Behind 93% of Attacks Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.
Daily Brief Summary
DragonForce ransomware operation compromised a managed service provider (MSP) using the SimpleHelp remote monitoring and management platform.
The attackers exploited older vulnerabilities in SimpleHelp identified as CVE-2024-57727, CVE-2024-57728, and CVE-2024-57726.
Initial attack stages involved reconnaissance on MSP customer systems, collecting critical information like device configurations and network connections.
Subsequent attack phases focused on data theft and deploying ransomware for double-extortion tactics; some attempts blocked by Sophos security solutions.
Impact varied across affected networks, with several customers experiencing data encryption and significant data theft.
Sophos has disseminated Indicators of Compromise (IOCs) to aid organizations in bolstering their network defenses.
The incident underscores the heightened risk to MSPs from ransomware groups, given their access to multiple networks via a single entry point.
DragonForce is increasing its market presence, partly through high-profile attacks and a ransomware-as-a-service (RaaS) model to attract affiliates.