dragonransomware is a ransomware operator no longer publishing new disclosures. Darkfield has indexed 39 public victims claimed by this operator between December 15, 2024 and December 17, 2024. DragonRansomware is a relatively new ransomware operation that emerged in December 2024, appearing to be financially motivated based on its targeting patterns and operational characteristics. The group's origin and potential affiliations remain unclear due to its recent emergence, though its global targeting scope suggests either international operations or ransomware-as-a-service capabilities. With 39 documented victims across multiple continents, the group demonstrates a broad attack methodology that has successfully compromised organizations in India, the United States, Saudi Arabia, the United Kingdom, and China, with particular focus on technology companies, business services, transportation and logistics firms, and educational institutions. The group's attack vectors, encryption methods, and specific tools remain largely undocumented in public threat intelligence reporting from major security firms and government agencies. Given the limited timeframe since its first observation in December 2024, notable high-profile campaigns and major incidents have not yet been extensively documented by established threat intelligence sources such as CISA, FBI, or leading cybersecurity research organizations. DragonRansomware appears to remain active as of early 2025, though comprehensive analysis of its operational capabilities and long-term threat potential requires additional observation and documentation by the cybersecurity community.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.