{"id":1557,"date":"2025-05-27T18:00:00","date_gmt":"2025-05-27T15:00:00","guid":{"rendered":"https:\/\/trustcrypt.com\/dragonforce-ransomware-exploited-in-msp-attack-utilizing-rmm-tool\/"},"modified":"2025-05-27T18:00:00","modified_gmt":"2025-05-27T15:00:00","slug":"dragonforce-ransomware-exploited-in-msp-attack-utilizing-rmm-tool","status":"publish","type":"post","link":"https:\/\/trustcrypt.com\/ar\/dragonforce-ransomware-exploited-in-msp-attack-utilizing-rmm-tool\/","title":{"rendered":"DragonForce Ransomware Exploited in MSP Attack Utilizing RMM Tool"},"content":{"rendered":"<p>A targeted cyber-attack exploiting a managed service provider\u2019s (MSP) remote monitoring and management tool has resulted in ransomware deployment and data theft across several client networks.<\/p>\n<p>The incident, identified and partly contained by Sophos Managed Detection and Response (MDR), involved the DragonForce ransomware-as-a-service (RaaS) operation.<\/p>\n<p>The attack began when a threat actor accessed the MSP\u2019s SimpleHelp remote monitoring and management (RMM) tool. From there, they pushed a malicious installer to multiple endpoints, gaining control of several client systems.<\/p>\n<p>Sophos researchers believe with medium confidence that the attacker exploited a combination of three vulnerabilities disclosed earlier this year:<\/p>\n<p>&#8211; CVE-2024-57727: Path traversal vulnerabilities<br \/>\n&#8211; CVE-2024-57728: Arbitrary file upload flaw<br \/>\n&#8211; CVE-2024-57726: Privilege escalation issue<\/p>\n<p>Once inside, the attackers exfiltrated sensitive client data and used DragonForce ransomware to encrypt systems. The group adopted a double extortion strategy, demanding ransom while threatening to leak stolen data.<\/p>\n<p>The breach was first detected through an anomalous SimpleHelp installer.<\/p>\n<p>Sophos said it traced the activity back to the MSP\u2019s RMM instance and found the attacker had gathered detailed information across multiple customer environments, including device names, user data, and network configurations.<\/p>\n<p>One client, protected by Sophos XDR and enrolled in MDR services, avoided the ransomware attack entirely. According to the security firm, behavioral detection and swift incident response actions neutralized the threat before damage occurred.<\/p>\n<p>However, other clients without MDR coverage were affected by both data loss and ransomware encryption.<\/p>\n<p>Sophos Rapid Response has since been engaged to assist the MSP with forensics and containment.<\/p>\n<h3>A Rising Threat Actor<\/h3>\n<p>DragonForce, which surfaced in mid-2023, has recently shifted to a distributed affiliate model and branded itself as a \u201ccartel.\u201d This rebranding aligns with its efforts to broaden its affiliate base.<\/p>\n<p>The group recently claimed to have taken over RansomHub infrastructure, a move that\u2019s drawn significant attention within the cyber-threat community.<\/p>\n<p>Reports suggest well-known ransomware affiliates have adopted DragonForce in recent attacks. These campaigns have targeted prominent retail businesses in both the UK and the US.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A targeted cyber-attack exploiting a managed service provider\u2019s (MSP) remote monitoring and management tool has resulted in ransomware deployment and&#8230;<\/p>\n","protected":false},"author":1,"featured_media":1558,"comment_status":"open","ping_status":"closed","sticky":false,"template":"Default","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[28],"tags":[175,119,67],"class_list":["post-1557","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-cyber-attack","tag-data-theft","tag-ransomware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>DragonForce Ransomware Exploited in MSP Attack Utilizing RMM Tool - Trustcrypt<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/trustcrypt.com\/ar\/dragonforce-ransomware-exploited-in-msp-attack-utilizing-rmm-tool\/\" \/>\n<meta property=\"og:locale\" content=\"ar_AR\" \/>\n<meta property=\"og:locale:alternate\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DragonForce Ransomware Exploited in MSP Attack Utilizing RMM Tool\" \/>\n<meta property=\"og:description\" content=\"A targeted cyber-attack exploiting a managed service provider\u2019s (MSP) remote monitoring and management tool has resulted in ransomware deployment and...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/trustcrypt.com\/ar\/dragonforce-ransomware-exploited-in-msp-attack-utilizing-rmm-tool\/\" \/>\n<meta property=\"og:site_name\" content=\"Trustcrypt\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-27T15:00:00+00:00\" \/>\n<meta name=\"author\" content=\"Trustscrypt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0643\u064f\u062a\u0628 \u0628\u0648\u0627\u0633\u0637\u0629\" \/>\n\t<meta name=\"twitter:data1\" content=\"Trustscrypt\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631\" \/>\n\t<meta name=\"twitter:data2\" content=\"\u062f\u0642\u064a\u0642\u062a\u0627\u0646\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/trustcrypt.com\/dragonforce-ransomware-exploited-in-msp-attack-utilizing-rmm-tool\/\",\"url\":\"https:\/\/trustcrypt.com\/dragonforce-ransomware-exploited-in-msp-attack-utilizing-rmm-tool\/\",\"name\":\"DragonForce Ransomware Exploited in MSP Attack Utilizing RMM Tool\",\"isPartOf\":{\"@id\":\"https:\/\/trustcrypt.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/trustcrypt.com\/dragonforce-ransomware-exploited-in-msp-attack-utilizing-rmm-tool\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/trustcrypt.com\/dragonforce-ransomware-exploited-in-msp-attack-utilizing-rmm-tool\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trustcrypt.com\/wp-content\/uploads\/2025\/05\/dragonforce-ransomware-exploited-in-msp-attack-utilizing-rmm-tool.webp\",\"datePublished\":\"2025-05-27T15:00:00+00:00\",\"author\":{\"@id\":\"https:\/\/trustcrypt.com\/#\/schema\/person\/469b1cf97b9f7ea4e4d7fa31689dfa9f\"},\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/trustcrypt.com\/dragonforce-ransomware-exploited-in-msp-attack-utilizing-rmm-tool\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/trustcrypt.com\/dragonforce-ransomware-exploited-in-msp-attack-utilizing-rmm-tool\/#primaryimage\",\"url\":\"https:\/\/trustcrypt.com\/wp-content\/uploads\/2025\/05\/dragonforce-ransomware-exploited-in-msp-attack-utilizing-rmm-tool.webp\",\"contentUrl\":\"https:\/\/trustcrypt.com\/wp-content\/uploads\/2025\/05\/dragonforce-ransomware-exploited-in-msp-attack-utilizing-rmm-tool.webp\",\"width\":1792,\"height\":1024,\"caption\":\"DragonForce Ransomware Exploited in MSP Attack Utilizing RMM Tool\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/trustcrypt.com\/#website\",\"url\":\"https:\/\/trustcrypt.com\/\",\"name\":\"Trustcrypt\",\"description\":\"\u0627\u0644\u0623\u0645\u0646 \u0647\u0648 \u0627\u0633\u0645\u0646\u0627 \u0627\u0644\u062b\u0627\u0646\u064a\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/trustcrypt.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ar\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/trustcrypt.com\/#\/schema\/person\/469b1cf97b9f7ea4e4d7fa31689dfa9f\",\"name\":\"Trustscrypt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/trustcrypt.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4c36ff3376565a0f4981e9397667feb08d5e09acacce32a52ea4a3f628e03692?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4c36ff3376565a0f4981e9397667feb08d5e09acacce32a52ea4a3f628e03692?s=96&d=mm&r=g\",\"caption\":\"Trustscrypt\"},\"sameAs\":[\"http:\/\/trustcrypt.com\"],\"url\":\"https:\/\/trustcrypt.com\/ar\/author\/trustscrypt\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DragonForce Ransomware Exploited in MSP Attack Utilizing RMM Tool - Trustcrypt","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/trustcrypt.com\/ar\/dragonforce-ransomware-exploited-in-msp-attack-utilizing-rmm-tool\/","og_locale":"ar_AR","og_type":"article","og_title":"[:en]DragonForce Ransomware Exploited in MSP Attack Utilizing RMM Tool[:] - Trustcrypt","og_description":"A targeted cyber-attack exploiting a managed service provider\u2019s (MSP) remote monitoring and management tool has resulted in ransomware deployment and...","og_url":"https:\/\/trustcrypt.com\/ar\/dragonforce-ransomware-exploited-in-msp-attack-utilizing-rmm-tool\/","og_site_name":"Trustcrypt","article_published_time":"2025-05-27T15:00:00+00:00","author":"Trustscrypt","twitter_card":"summary_large_image","twitter_misc":{"\u0643\u064f\u062a\u0628 \u0628\u0648\u0627\u0633\u0637\u0629":"Trustscrypt","\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631":"\u062f\u0642\u064a\u0642\u062a\u0627\u0646"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/trustcrypt.com\/dragonforce-ransomware-exploited-in-msp-attack-utilizing-rmm-tool\/","url":"https:\/\/trustcrypt.com\/dragonforce-ransomware-exploited-in-msp-attack-utilizing-rmm-tool\/","name":"DragonForce Ransomware Exploited in MSP Attack Utilizing RMM Tool","isPartOf":{"@id":"https:\/\/trustcrypt.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/trustcrypt.com\/dragonforce-ransomware-exploited-in-msp-attack-utilizing-rmm-tool\/#primaryimage"},"image":{"@id":"https:\/\/trustcrypt.com\/dragonforce-ransomware-exploited-in-msp-attack-utilizing-rmm-tool\/#primaryimage"},"thumbnailUrl":"https:\/\/trustcrypt.com\/wp-content\/uploads\/2025\/05\/dragonforce-ransomware-exploited-in-msp-attack-utilizing-rmm-tool.webp","datePublished":"2025-05-27T15:00:00+00:00","author":{"@id":"https:\/\/trustcrypt.com\/#\/schema\/person\/469b1cf97b9f7ea4e4d7fa31689dfa9f"},"inLanguage":"ar","potentialAction":[{"@type":"ReadAction","target":["https:\/\/trustcrypt.com\/dragonforce-ransomware-exploited-in-msp-attack-utilizing-rmm-tool\/"]}]},{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/trustcrypt.com\/dragonforce-ransomware-exploited-in-msp-attack-utilizing-rmm-tool\/#primaryimage","url":"https:\/\/trustcrypt.com\/wp-content\/uploads\/2025\/05\/dragonforce-ransomware-exploited-in-msp-attack-utilizing-rmm-tool.webp","contentUrl":"https:\/\/trustcrypt.com\/wp-content\/uploads\/2025\/05\/dragonforce-ransomware-exploited-in-msp-attack-utilizing-rmm-tool.webp","width":1792,"height":1024,"caption":"DragonForce Ransomware Exploited in MSP Attack Utilizing RMM Tool"},{"@type":"WebSite","@id":"https:\/\/trustcrypt.com\/#website","url":"https:\/\/trustcrypt.com\/","name":"Trustcrypt","description":"\u0627\u0644\u0623\u0645\u0646 \u0647\u0648 \u0627\u0633\u0645\u0646\u0627 \u0627\u0644\u062b\u0627\u0646\u064a","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/trustcrypt.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ar"},{"@type":"Person","@id":"https:\/\/trustcrypt.com\/#\/schema\/person\/469b1cf97b9f7ea4e4d7fa31689dfa9f","name":"Trustscrypt","image":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/trustcrypt.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4c36ff3376565a0f4981e9397667feb08d5e09acacce32a52ea4a3f628e03692?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4c36ff3376565a0f4981e9397667feb08d5e09acacce32a52ea4a3f628e03692?s=96&d=mm&r=g","caption":"Trustscrypt"},"sameAs":["http:\/\/trustcrypt.com"],"url":"https:\/\/trustcrypt.com\/ar\/author\/trustscrypt\/"}]}},"_links":{"self":[{"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/posts\/1557","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/comments?post=1557"}],"version-history":[{"count":0,"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/posts\/1557\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/media\/1558"}],"wp:attachment":[{"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/media?parent=1557"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/categories?post=1557"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/tags?post=1557"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}