LockBit, Qilin, and DragonForce Join Forces to Dominate the Ransomware Ecosystem
Three prominent ransomware groups DragonForce, LockBit, and Qilin have announced a new strategic ransomware alliance, once underscoring continued shifts in the cyber threat landscape. The coalition is seen as an attempt on the part of the financially motivated threat actors to conduct more effective ransomware attacks, ReliaQuest said in a report shared with The Hacker News. "Announced shortly
AI Analysis
Technical Summary
The ransomware ecosystem is witnessing a significant shift as three prominent ransomware groups—LockBit, Qilin, and DragonForce—have announced a strategic alliance aimed at dominating the ransomware threat landscape. This coalition is designed to pool their operational capabilities, including sharing attack techniques, infrastructure, and resources, thereby enhancing the effectiveness and reach of their ransomware campaigns. LockBit, which suffered a major disruption in early 2024 due to law enforcement operations (Cronos), is making a comeback with LockBit 5.0. This new version supports attacks on Windows, Linux, and ESXi platforms, broadening the scope of potential victims. Qilin has emerged as the most active group recently, with a high operational tempo and a focus on North American targets, but its activities also impact Europe. The alliance is expected to restore LockBit's reputation among affiliates, potentially leading to a surge in attacks, including on critical infrastructure and sectors previously considered low risk. The coalition's formation reflects a trend of ransomware groups consolidating power to increase financial gains and operational resilience. The ransomware-as-a-service (RaaS) model continues to evolve, with new entrants like Scattered Spider launching English-speaking RaaS offerings, further complicating the threat landscape. The alliance's impact is amplified by the increasing number of data leak sites and the diversification of targeted sectors, including professional services, manufacturing, healthcare, finance, and education. European organizations, particularly in Germany, the UK, and Italy, are among the most affected due to their market size, digital infrastructure, and historical targeting patterns. The alliance's activities underscore the need for enhanced detection, response, and resilience strategies against sophisticated ransomware threats.
Potential Impact
For European organizations, this alliance poses a heightened risk of ransomware attacks that are more coordinated, sophisticated, and widespread. The expansion of LockBit 5.0 to Linux and ESXi systems increases the attack surface, affecting organizations with diverse IT environments. Critical infrastructure and sectors previously considered low risk may now face increased targeting, potentially disrupting essential services and causing significant operational and financial damage. The professional, scientific, technical services, manufacturing, healthcare, finance, and education sectors in Europe are particularly vulnerable due to their digital dependencies and historical targeting. The alliance could lead to a surge in ransom demands, data breaches, and operational downtime, impacting confidentiality, integrity, and availability of data and systems. Additionally, the restoration of LockBit's affiliate trust may increase the volume of attacks, complicating incident response efforts. The geopolitical context, including Europe's strategic importance and existing cyber threat activity, further elevates the risk. Organizations may face reputational damage, regulatory penalties, and increased costs related to recovery and mitigation. The evolving ransomware-as-a-service ecosystem also lowers the barrier for new threat actors to launch attacks, increasing overall threat frequency.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy tailored to the evolving ransomware threat landscape. Specific recommendations include: 1) Conduct thorough asset inventories to identify and prioritize protection for Windows, Linux, and ESXi systems, ensuring all are patched and hardened against known vulnerabilities. 2) Deploy advanced endpoint detection and response (EDR) solutions capable of detecting ransomware behaviors across multiple operating systems. 3) Implement network segmentation to limit lateral movement, especially protecting critical infrastructure and sensitive sectors. 4) Enforce strict access controls and multi-factor authentication (MFA) for all remote access and privileged accounts to reduce the risk of initial compromise. 5) Regularly back up data with offline or immutable backups and test restoration procedures to ensure resilience against ransomware encryption. 6) Monitor darknet forums and ransomware data leak sites for early indicators of compromise or targeting relevant to the organization. 7) Conduct targeted phishing awareness and social engineering training, as ransomware affiliates often use such vectors. 8) Collaborate with national cybersecurity centers and share threat intelligence to stay updated on emerging tactics from the LockBit-Qilin-DragonForce alliance. 9) Prepare incident response plans specifically addressing multi-platform ransomware attacks, including coordination with law enforcement. 10) Evaluate and enhance cloud security posture, given the integration of cloud services in many European enterprises.
Affected Countries
Germany, United Kingdom, Italy, France, Netherlands, Belgium, Spain, Poland
LockBit, Qilin, and DragonForce Join Forces to Dominate the Ransomware Ecosystem
Description
Three prominent ransomware groups DragonForce, LockBit, and Qilin have announced a new strategic ransomware alliance, once underscoring continued shifts in the cyber threat landscape. The coalition is seen as an attempt on the part of the financially motivated threat actors to conduct more effective ransomware attacks, ReliaQuest said in a report shared with The Hacker News. "Announced shortly
AI-Powered Analysis
Technical Analysis
The ransomware ecosystem is witnessing a significant shift as three prominent ransomware groups—LockBit, Qilin, and DragonForce—have announced a strategic alliance aimed at dominating the ransomware threat landscape. This coalition is designed to pool their operational capabilities, including sharing attack techniques, infrastructure, and resources, thereby enhancing the effectiveness and reach of their ransomware campaigns. LockBit, which suffered a major disruption in early 2024 due to law enforcement operations (Cronos), is making a comeback with LockBit 5.0. This new version supports attacks on Windows, Linux, and ESXi platforms, broadening the scope of potential victims. Qilin has emerged as the most active group recently, with a high operational tempo and a focus on North American targets, but its activities also impact Europe. The alliance is expected to restore LockBit's reputation among affiliates, potentially leading to a surge in attacks, including on critical infrastructure and sectors previously considered low risk. The coalition's formation reflects a trend of ransomware groups consolidating power to increase financial gains and operational resilience. The ransomware-as-a-service (RaaS) model continues to evolve, with new entrants like Scattered Spider launching English-speaking RaaS offerings, further complicating the threat landscape. The alliance's impact is amplified by the increasing number of data leak sites and the diversification of targeted sectors, including professional services, manufacturing, healthcare, finance, and education. European organizations, particularly in Germany, the UK, and Italy, are among the most affected due to their market size, digital infrastructure, and historical targeting patterns. The alliance's activities underscore the need for enhanced detection, response, and resilience strategies against sophisticated ransomware threats.
Potential Impact
For European organizations, this alliance poses a heightened risk of ransomware attacks that are more coordinated, sophisticated, and widespread. The expansion of LockBit 5.0 to Linux and ESXi systems increases the attack surface, affecting organizations with diverse IT environments. Critical infrastructure and sectors previously considered low risk may now face increased targeting, potentially disrupting essential services and causing significant operational and financial damage. The professional, scientific, technical services, manufacturing, healthcare, finance, and education sectors in Europe are particularly vulnerable due to their digital dependencies and historical targeting. The alliance could lead to a surge in ransom demands, data breaches, and operational downtime, impacting confidentiality, integrity, and availability of data and systems. Additionally, the restoration of LockBit's affiliate trust may increase the volume of attacks, complicating incident response efforts. The geopolitical context, including Europe's strategic importance and existing cyber threat activity, further elevates the risk. Organizations may face reputational damage, regulatory penalties, and increased costs related to recovery and mitigation. The evolving ransomware-as-a-service ecosystem also lowers the barrier for new threat actors to launch attacks, increasing overall threat frequency.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy tailored to the evolving ransomware threat landscape. Specific recommendations include: 1) Conduct thorough asset inventories to identify and prioritize protection for Windows, Linux, and ESXi systems, ensuring all are patched and hardened against known vulnerabilities. 2) Deploy advanced endpoint detection and response (EDR) solutions capable of detecting ransomware behaviors across multiple operating systems. 3) Implement network segmentation to limit lateral movement, especially protecting critical infrastructure and sensitive sectors. 4) Enforce strict access controls and multi-factor authentication (MFA) for all remote access and privileged accounts to reduce the risk of initial compromise. 5) Regularly back up data with offline or immutable backups and test restoration procedures to ensure resilience against ransomware encryption. 6) Monitor darknet forums and ransomware data leak sites for early indicators of compromise or targeting relevant to the organization. 7) Conduct targeted phishing awareness and social engineering training, as ransomware affiliates often use such vectors. 8) Collaborate with national cybersecurity centers and share threat intelligence to stay updated on emerging tactics from the LockBit-Qilin-DragonForce alliance. 9) Prepare incident response plans specifically addressing multi-platform ransomware attacks, including coordination with law enforcement. 10) Evaluate and enhance cloud security posture, given the integration of cloud services in many European enterprises.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2025/10/lockbit-qilin-and-dragonforce-join.html","fetched":true,"fetchedAt":"2025-10-09T01:05:06.457Z","wordCount":1225}
Threat ID: 68e70a4432de7eb26af4e141
Added to database: 10/9/2025, 1:05:08 AM
Last enriched: 10/9/2025, 1:06:06 AM
Last updated: 10/9/2025, 3:27:53 PM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
From CPU Spikes to Defense
HighCVE-2025-36225: CWE-203 Observable Discrepancy in IBM Aspera Faspex
MediumCVE-2023-37401: CWE-942 Overly Permissive Cross-domain Whitelist in IBM Aspera Faspex
MediumCVE-2025-36171: CWE-770 Allocation of Resources Without Limits or Throttling in IBM Aspera Faspex
MediumTake Note: Cyber-Risks With AI Notetakers
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.