Cyber Security News

DragonForce and Anubis Ransomware Gangs Launch New Affiliate Programs

Secureworks Counter Threat Unit (CTU) researchers have uncovered innovative strategies deployed by the DragonForce and Anubis ransomware operators in 2025.

These groups are adapting to law enforcement pressures with novel affiliate models designed to maximize profits and expand their reach, showcasing the resilience and ingenuity of modern cybercriminals in underground forums.

DragonForce Pioneers a Distributed Affiliate Branding Model

DragonForce, first identified in August 2023 as a conventional ransomware-as-a-service (RaaS) operation, has undergone a significant transformation by March 2025.

Initially gaining traction after advertising on dark web forums in February 2024, the group amassed a victim count of 136 on its leak site as of March 24, 2025.

In a bold move announced on March 19 via an underground post, DragonForce rebranded itself as a “cartel” and shifted to a distributed model.

This new approach allows affiliates to establish their own unique “brands” while leveraging DragonForce’s robust infrastructure, including administration panels, encryption tools, ransom negotiation systems, Tor-based leak sites, and support services.

Unlike traditional RaaS schemes, affiliates are not mandated to use DragonForce’s ransomware, offering unprecedented flexibility.

This model lowers the technical barriers for less-skilled threat actors while appealing to sophisticated operators who prefer to deploy custom malware without building their own backend.

However, this shared infrastructure introduces a potential vulnerability if one affiliate is compromised, it could expose operational details of others, posing risks to the entire network.

This strategic pivot is poised to broaden DragonForce’s affiliate base, potentially amplifying its financial gains while challenging defenders with a more diverse threat landscape.

Anubis Introduces Multi-Mode Extortion Tactics

Simultaneously, the Anubis ransomware group, advertised since late February 2025 on underground platforms, has rolled out a distinctive extortion framework with three affiliate options tailored to varying skill levels and operational focuses.

According to Secureworks Report, the first is a traditional RaaS model with file encryption, offering affiliates an 80% ransom share.

The second, a “data ransom” mode, focuses solely on data theft, providing a 60% cut by publishing detailed “investigative articles” on compromised data to a password-protected Tor site, pressuring victims through public leak threats and notifications to customers via an X (formerly Twitter) account.

Uniquely, Anubis escalates by threatening to report breaches to regulatory bodies like the UK’s ICO, the US HHS, and the European EDPB an aggressive tactic echoing past actions by groups like GOLD BLAZER in 2023 with the SEC.

The third option, “accesses monetization,” assists affiliates in extorting already compromised victims with detailed data analyses for negotiation leverage, offering a 50% ransom share.

Advertisement for Anubis “accesses monetization” service.

Notably, Anubis excludes targets in post-Soviet states, BRICS nations, and sectors like education and government, but leaves healthcare organizations exposed, likely due to their sensitive data and compliance pressures.

This multi-tiered model diversifies Anubis’s appeal, drawing in a spectrum of cybercriminals while intensifying victim coercion through regulatory threats.

These developments underscore the relentless adaptability of ransomware operators, as DragonForce and Anubis refine their business models to evade disruption and maximize impact.

Cybersecurity professionals must anticipate these evolving tactics by enhancing detection, incident response, and international cooperation to counter the growing sophistication of such threats.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

Ivanti Released Security Updates to Fix for the Mutiple RCE Vulnerabilities – Patch Now

Ivanti, a leading enterprise software provider, has released critical security updates addressing vulnerabilities across several…

11 minutes ago

Fortinet FortiVoice Zero-day Vulnerability Actively Exploited in The Wild

A critical stack-based buffer overflow vulnerability (CWE-121) has been discovered in multiple Fortinet products, including…

36 minutes ago

Ransomware Attacks Surge by 123% Amid Evolving Tactics and Strategies

The 2025 Third-Party Breach Report from Black Kite highlights a staggering 123% surge in ransomware…

1 hour ago

Researchers Introduce Mythic Framework Agent to Enhance Pentesting Tool Performance

Penetration testing is still essential for upholding strong security procedures in a time when cybersecurity…

1 hour ago

Swan Vector APT Targets Organizations with Malicious LNK and DLL Implants

A newly identified advanced persistent threat (APT) campaign, dubbed "Swan Vector" by Seqrite Labs, has…

1 hour ago

Hackers Weaponize KeePass Password Manager to Spread Malware and Steal Passwords

Threat actors have successfully exploited the widely-used open-source password manager, KeePass, to spread malware and…

2 hours ago