Dragonforce Ransomware
ActiveThreat actor group tracked in the global ransomware database ยท Last disclosure: May 22, 2026
Threat Actor Analysis
Dragonforce is a ransomware threat group that has disclosed 499 victims in publicly accessible leak site data, representing 2.8% of all ransomware attacks tracked in this database. The earliest victim disclosure attributed to Dragonforce in our dataset dates to May 2026.
Geographically, Dragonforce has targeted organisations in 55 countries. The most frequently targeted nation is United States with 264 victim organisations. Other heavily targeted nations include United Kingdom, Germany, Italy.
Industry-wise, Dragonforce shows a concentration in the Manufacturing, Business Services, Hospitality and Tourism sectors. These industries are frequently targeted because they manage sensitive data, critical operations, or have lower tolerance for operational downtime โ conditions that increase ransom payment likelihood.
Like most modern ransomware operations, Dragonforce likely employs a double extortion model: encrypting victim files while simultaneously exfiltrating data, creating dual pressure to pay the ransom. Victim organisations that refuse payment face having their data published on the group's dark web leak site.
Note: This profile is generated from public leak site disclosures aggregated via the ransomware.live API. Data is updated automatically. The victim table below shows the 15 most recent cached victims; the total victim count (499) reflects the complete database.
Recent Victim Disclosures (15 cached of 499 total)
| # | Organization | Country | Sector | Date |
|---|---|---|---|---|
| 1 |
Le Pain Quotidien US
lepainquotidien.com
|
๐บ๐ธ United States | Hospitality and Tourism | May 22, 2026 |
| 2 |
Vega
vega-corp.com
|
โ | โ | May 20, 2026 |
| 3 |
ZFG ALTHERM Engineering
zfg-altherm.at
|
๐ฆ๐น Austria | Manufacturing | May 19, 2026 |
| 4 |
TAURUS INVESTMENT HOLDINGS
tiholdings.com
|
CY | Financial Services | May 19, 2026 |
| 5 |
Plan
plan.com
|
๐บ๐ธ United States | โ | May 17, 2026 |
| 6 |
Ingelan
ingelan.com
|
๐ช๐ธ Spain | Manufacturing | May 17, 2026 |
| 7 |
AdvancedHEALTH
ouradvancedhealth.com
|
๐บ๐ธ United States | Healthcare | May 16, 2026 |
| 8 |
LeRoy Surveyors & Engineers
lseinc.com
|
๐บ๐ธ United States | Business Services | May 15, 2026 |
| 9 |
Advanced Medical Consultants
ouradvancedhealth.com
|
๐บ๐ธ United States | Healthcare | May 15, 2026 |
| 10 |
MicroMarketing
micromarketing.org
|
โ | Business Services | May 13, 2026 |
| 11 |
Pamil Modulsystem
pamil.se
|
๐ธ๐ช Sweden | Manufacturing | May 13, 2026 |
| 12 |
Tricon Infotech
triconinfotech.com
|
๐ฎ๐ณ India | Technology | May 13, 2026 |
| 13 |
CF Evans Construction
www.cfevans.com
|
๐บ๐ธ United States | Construction | May 8, 2026 |
| 14 |
CMC Expertise Comptable
cmcexpertise.fr
|
๐ซ๐ท France | Business Services | May 8, 2026 |
| 15 |
Cult Wines
cultwines.com
|
๐ฌ๐ง United Kingdom | Hospitality and Tourism | May 4, 2026 |
Frequently Asked Questions
What is Dragonforce ransomware?
Dragonforce is a ransomware threat group that has claimed 499 victims since its first known activity in May 2026. The group operates by infiltrating target networks, exfiltrating data, encrypting files, and threatening to publish stolen data on a dark web leak site if the ransom is not paid.
How many victims has Dragonforce attacked?
Dragonforce has claimed 499 victims in our database, representing 2.8% of all tracked ransomware attacks. The most targeted countries are United States, United Kingdom, Germany, Italy.
Which countries does Dragonforce target?
Dragonforce has attacked organizations in 55 countries. The top targeted countries are: United States, United Kingdom, Germany, Italy.
Which industries does Dragonforce target?
Dragonforce most frequently targets the Manufacturing, Business Services, Hospitality and Tourism sectors based on victim disclosures in our database.
Is Dragonforce still active?
Dragonforce's most recent victim disclosure in our database was on May 22, 2026. Ransomware groups frequently rebrand or go dormant; monitor this page and our ransomware map for the latest activity.