Nihon Cyber Defence

What Cyber Leaders Need to Know About RansomHub’s Collapse and the Ransomware Cartel Model

A Turning Point in the Ransomware-as-a-Service Ecosystem

As ransomware groups evolve into decentralised cartels, situational awareness and coordinated response are critical for Japan’s digital resilience.

In late March 2025, the ransomware group RansomHub abruptly ceased operations. Its leak site and victim negotiation portals went offline without warning. Within days, a competing group, DragonForce, publicly claimed RansomHub had migrated to its infrastructure and invited affiliates to join what it described as a “ransomware cartel.”

While the claim remains unverified, the timing and messaging suggest a broader shift in the Ransomware-as-a-Service (RaaS) landscape.

What emerged was not just another group takeover, but a signal that ransomware operations are evolving toward more decentralised, service-centric models.

RansomHub Shutdown: What Happened and Why It Matters

RansomHub had, by early 2025, become one of the most active RaaS groups globally, with frequent attacks across manufacturing, healthcare, and IT sectors.

Known for custom tooling and high-volume activity, it attracted experienced affiliates with generous revenue splits.

On 31 March, its infrastructure went dark. Two days later, DragonForce announced a new affiliate structure offering shared services — including leak sites, negotiation tools, and support — while allowing affiliates to operate under their own names.

This franchise-style “cartel” model reflects a significant change in how ransomware groups structure themselves and scale operations.

Key Risks for Companies from Cartel-Style Ransomware

Ransomware Group Instability Creates Tactical Openings

RansomHub’s silence and the confusion that followed show how vulnerable even established RaaS groups are to disruption.

For a brief time, defenders may benefit from reduced coordination among affiliates or abandoned victim engagements.

Decentralised RaaS Models Increase Complexity

DragonForce’s cartel model allows affiliates to move more freely between brands and campaigns.

This flexibility increases the challenge for attribution, response planning, and negotiation, especially when infrastructure is shared across multiple actors.

Japan is Likely Within Scope of DragonForce Expansion

While RansomHub’s focus was on North America and Europe, DragonForce has begun expanding into Asia and the Middle East.

Japanese organisations, particularly those in manufacturing and logistics, should anticipate being drawn further into scope.

Implications for Japan’s Cyber Resilience and Digital Sovereignty

This evolution comes as Japan’s national cyber strategy enters a new phase, with the Active Cyber Defence bill and other initiatives placing greater emphasis on private–public coordination.

The rise of agile, service-oriented criminal ecosystems presents new challenges for defenders, regulators, and response teams alike.

Organisations that rely on complex supply chains or operate in critical sectors must be prepared for adversaries who are faster-moving, better resourced, and less centralised.

A strong understanding of how these structures operate is key to effective defence.

What Organisations Can Do Now

  1. Review exposure to third-party risk and critical supply chains
  2. Rehearse incident response scenarios that include ransomware group collapse or affiliate defection
  3. Monitor dark web trends to detect early shifts in attacker infrastructure or targeting patterns

Why Cyber Strategy Must Evolve with the Adversary

RansomHub’s collapse and DragonForce’s opportunistic rise reflect more than a leadership transition. 

They mark a shift in how cybercriminal operations are structured and scaled. Understanding these changes is essential to anticipating future risk.

At Nihon Cyber Defence, we monitor underground activity, affiliate migration, and emerging attack models not only to support technical response, but to inform strategic decision-making. 

Strengthening Japan’s digital sovereignty requires this dual perspective both operational and forward-looking. Contact Us.

toshio-nawa
Toshio Nawa

Chief Technology Officer (CTO)

After military and JPCERT/CC experience, Nawa joined Nihon Cyber Defence in 2018, specializing in CSIRT and threat intelligence advisory.

Edit Template

Cyber Maturity Assessment

Nihon Cyber Defence (NCD) offers comprehensive Cyber Maturity Assessments designed to evaluate an organisations current cyber security capabilities, identify areas for improvement, and develop a strategic roadmap to enhance overall security posture.

Cyber Security Framework (NIST)

National Institute of Standards and Technology

NIST Framework Graphic

Cyber Assessment Framework (CAF)

National Cyber Security Centre

CAF Framework Graphic
Edit Template

More from NCD​

What Cyber Leaders Need to Know About RansomHub’s Collapse and the Ransomware Cartel Model

Learn how RansomHub’s collapse signals a shift to ransomware cartel models. NCD CTO Toshio Nawa explains what Japanese cyber leaders must know to defend critical sectors...

John Moore Appointed CFO of Nihon Cyber Defence

Nihon Cyber Defence names John Moore as CFO to guide financial strategy and scalable growth. Moore brings over 20 years of leadership experience across Japan, APAC, and global markets, strengthening...

China’s APT Threats to Japan’s Critical Infrastructure

China-linked APT groups—Salt, Volt, and Silk Typhoon—are reshaping cyber warfare. Learn how these threats target Japan’s critical infrastructure and how to respond effectively...

Empowering the Next Generation of Cyber Security Talent

NCD joined the Empower Girls event in Belfast, inspiring 600 young girls to explore careers in cyber security through hands-on learning and role models...

Nihon Cyber Defence and Netcraft Strategic Partnership

NCD and Netcraft are teaming up to deliver real-time phishing detection and takedown in Japan. Learn how this partnership boosts national cyber resilience...

Toshio Nawa Appointed as CTO of Nihon Cyber Defence

The collaboration combines Fivecast’s advanced AI-powered OSINT technology with NCD’s expertise in cyber threat intelligence and Japanese cyber security needs, delivering actionable intelligence...

Enhancing Japan’s Cyber Resilience Against Information Warfare | NCD

Mandatory reporting and ransom payment bans sound tough on cybercrime, but will they actually work? Businesses need a smarter approach to ransomware resilience. Here’s what needs to change...

Japan’s Active Cyber Defense Bill Passes Lower House

Japan passes cyber security bill enabling preemptive threat disruption by 2027. What critical infrastructure, finance, and industry leaders must prepare for...

The Ransomware Dilemma

Mandatory reporting and ransom payment bans sound tough on cybercrime, but will they actually work? Businesses need a smarter approach to ransomware resilience. Here’s what needs to change...
Edit Template