DR

Dragonforce Ransomware

Active

Threat actor group tracked in the global ransomware database ยท Last disclosure: May 22, 2026

Ransomware-as-a-Service (RaaS) Double Extortion Target: Manufacturing
499
Total Victims
2.8% of all tracked
55
Countries Targeted
7
Sectors Targeted
2026
First Seen

Threat Actor Analysis

Dragonforce is a ransomware threat group that has disclosed 499 victims in publicly accessible leak site data, representing 2.8% of all ransomware attacks tracked in this database. The earliest victim disclosure attributed to Dragonforce in our dataset dates to May 2026.

Geographically, Dragonforce has targeted organisations in 55 countries. The most frequently targeted nation is United States with 264 victim organisations. Other heavily targeted nations include United Kingdom, Germany, Italy.

Industry-wise, Dragonforce shows a concentration in the Manufacturing, Business Services, Hospitality and Tourism sectors. These industries are frequently targeted because they manage sensitive data, critical operations, or have lower tolerance for operational downtime โ€” conditions that increase ransom payment likelihood.

Like most modern ransomware operations, Dragonforce likely employs a double extortion model: encrypting victim files while simultaneously exfiltrating data, creating dual pressure to pay the ransom. Victim organisations that refuse payment face having their data published on the group's dark web leak site.

Note: This profile is generated from public leak site disclosures aggregated via the ransomware.live API. Data is updated automatically. The victim table below shows the 15 most recent cached victims; the total victim count (499) reflects the complete database.

Recent Victim Disclosures (15 cached of 499 total)

# Organization Country Sector Date
1
Le Pain Quotidien US
lepainquotidien.com
๐Ÿ‡บ๐Ÿ‡ธ United States Hospitality and Tourism May 22, 2026
2
Vega
vega-corp.com
โ€” โ€” May 20, 2026
3
ZFG ALTHERM Engineering
zfg-altherm.at
๐Ÿ‡ฆ๐Ÿ‡น Austria Manufacturing May 19, 2026
4
TAURUS INVESTMENT HOLDINGS
tiholdings.com
CY Financial Services May 19, 2026
5
Plan
plan.com
๐Ÿ‡บ๐Ÿ‡ธ United States โ€” May 17, 2026
6
Ingelan
ingelan.com
๐Ÿ‡ช๐Ÿ‡ธ Spain Manufacturing May 17, 2026
7
AdvancedHEALTH
ouradvancedhealth.com
๐Ÿ‡บ๐Ÿ‡ธ United States Healthcare May 16, 2026
8
LeRoy Surveyors & Engineers
lseinc.com
๐Ÿ‡บ๐Ÿ‡ธ United States Business Services May 15, 2026
9
Advanced Medical Consultants
ouradvancedhealth.com
๐Ÿ‡บ๐Ÿ‡ธ United States Healthcare May 15, 2026
10
MicroMarketing
micromarketing.org
โ€” Business Services May 13, 2026
11
Pamil Modulsystem
pamil.se
๐Ÿ‡ธ๐Ÿ‡ช Sweden Manufacturing May 13, 2026
12
Tricon Infotech
triconinfotech.com
๐Ÿ‡ฎ๐Ÿ‡ณ India Technology May 13, 2026
13
CF Evans Construction
www.cfevans.com
๐Ÿ‡บ๐Ÿ‡ธ United States Construction May 8, 2026
14
CMC Expertise Comptable
cmcexpertise.fr
๐Ÿ‡ซ๐Ÿ‡ท France Business Services May 8, 2026
15
Cult Wines
cultwines.com
๐Ÿ‡ฌ๐Ÿ‡ง United Kingdom Hospitality and Tourism May 4, 2026

Frequently Asked Questions

What is Dragonforce ransomware?

Dragonforce is a ransomware threat group that has claimed 499 victims since its first known activity in May 2026. The group operates by infiltrating target networks, exfiltrating data, encrypting files, and threatening to publish stolen data on a dark web leak site if the ransom is not paid.

How many victims has Dragonforce attacked?

Dragonforce has claimed 499 victims in our database, representing 2.8% of all tracked ransomware attacks. The most targeted countries are United States, United Kingdom, Germany, Italy.

Which countries does Dragonforce target?

Dragonforce has attacked organizations in 55 countries. The top targeted countries are: United States, United Kingdom, Germany, Italy.

Which industries does Dragonforce target?

Dragonforce most frequently targets the Manufacturing, Business Services, Hospitality and Tourism sectors based on victim disclosures in our database.

Is Dragonforce still active?

Dragonforce's most recent victim disclosure in our database was on May 22, 2026. Ransomware groups frequently rebrand or go dormant; monitor this page and our ransomware map for the latest activity.