DragonRansomware is a relatively new ransomware operation that emerged in December 2024, appearing to be financially motivated based on its targeting patterns and operational characteristics. The group's origin and potential affiliations remain unclear due to its recent emergence, though its global targeting scope suggests either international operations or ransomware-as-a-service capabilities. With 39 documented victims across multiple continents, the group demonstrates a broad attack methodology that has successfully compromised organizations in India, the United States, Saudi Arabia, the United Kingdom, and China, with particular focus on technology companies, business services, transportation and logistics firms, and educational institutions. The group's attack vectors, encryption methods, and specific tools remain largely undocumented in public threat intelligence reporting from major security firms and government agencies. Given the limited timeframe since its first observation in December 2024, notable high-profile campaigns and major incidents have not yet been extensively documented by established threat intelligence sources such as CISA, FBI, or leading cybersecurity research organizations. DragonRansomware appears to remain active as of early 2025, though comprehensive analysis of its operational capabilities and long-term threat potential requires additional observation and documentation by the cybersecurity community. The group has been linked to 39 public disclosures across our corpus. First observed on a leak site on December 15, 2024; most recent post December 17, 2024. The operation is currently inactive.
Sector and geography
This disclosure adds to ransomware activity in the Financial sector, which has 333 disclosures indexed across all operators we track. Geographically, stleasing.tj is reported in TJ.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.