Nihon Cyber Defence

What Cyber Leaders Need to Know About RansomHub’s Collapse and the Ransomware Cartel Model

A Turning Point in the Ransomware-as-a-Service Ecosystem

As ransomware groups evolve into decentralised cartels, situational awareness and coordinated response are critical for Japan’s digital resilience.

In late March 2025, the ransomware group RansomHub abruptly ceased operations. Its leak site and victim negotiation portals went offline without warning. Within days, a competing group, DragonForce, publicly claimed RansomHub had migrated to its infrastructure and invited affiliates to join what it described as a “ransomware cartel.”

While the claim remains unverified, the timing and messaging suggest a broader shift in the Ransomware-as-a-Service (RaaS) landscape.

What emerged was not just another group takeover, but a signal that ransomware operations are evolving toward more decentralised, service-centric models.

RansomHub Shutdown: What Happened and Why It Matters

RansomHub had, by early 2025, become one of the most active RaaS groups globally, with frequent attacks across manufacturing, healthcare, and IT sectors.

Known for custom tooling and high-volume activity, it attracted experienced affiliates with generous revenue splits.

On 31 March, its infrastructure went dark. Two days later, DragonForce announced a new affiliate structure offering shared services — including leak sites, negotiation tools, and support — while allowing affiliates to operate under their own names.

This franchise-style “cartel” model reflects a significant change in how ransomware groups structure themselves and scale operations.

Key Risks for Companies from Cartel-Style Ransomware

Ransomware Group Instability Creates Tactical Openings

RansomHub’s silence and the confusion that followed show how vulnerable even established RaaS groups are to disruption.

For a brief time, defenders may benefit from reduced coordination among affiliates or abandoned victim engagements.

Decentralised RaaS Models Increase Complexity

DragonForce’s cartel model allows affiliates to move more freely between brands and campaigns.

This flexibility increases the challenge for attribution, response planning, and negotiation, especially when infrastructure is shared across multiple actors.

Japan is Likely Within Scope of DragonForce Expansion

While RansomHub’s focus was on North America and Europe, DragonForce has begun expanding into Asia and the Middle East.

Japanese organisations, particularly those in manufacturing and logistics, should anticipate being drawn further into scope.

Implications for Japan’s Cyber Resilience and Digital Sovereignty

This evolution comes as Japan’s national cyber strategy enters a new phase, with the Active Cyber Defence bill and other initiatives placing greater emphasis on private–public coordination.

The rise of agile, service-oriented criminal ecosystems presents new challenges for defenders, regulators, and response teams alike.

Organisations that rely on complex supply chains or operate in critical sectors must be prepared for adversaries who are faster-moving, better resourced, and less centralised.

A strong understanding of how these structures operate is key to effective defence.

What Organisations Can Do Now

  1. Review exposure to third-party risk and critical supply chains
  2. Rehearse incident response scenarios that include ransomware group collapse or affiliate defection
  3. Monitor dark web trends to detect early shifts in attacker infrastructure or targeting patterns

Why Cyber Strategy Must Evolve with the Adversary

RansomHub’s collapse and DragonForce’s opportunistic rise reflect more than a leadership transition. 

They mark a shift in how cybercriminal operations are structured and scaled. Understanding these changes is essential to anticipating future risk.

At Nihon Cyber Defence, we monitor underground activity, affiliate migration, and emerging attack models not only to support technical response, but to inform strategic decision-making. 

Strengthening Japan’s digital sovereignty requires this dual perspective both operational and forward-looking. Contact Us.

toshio-nawa
Toshio Nawa

Chief Technology Officer (CTO)

After military and JPCERT/CC experience, Nawa joined Nihon Cyber Defence in 2018, specializing in CSIRT and threat intelligence advisory.

Edit Template

Cyber Maturity Assessment

Nihon Cyber Defence (NCD) offers comprehensive Cyber Maturity Assessments designed to evaluate an organisations current cyber security capabilities, identify areas for improvement, and develop a strategic roadmap to enhance overall security posture.

Cyber Security Framework (NIST)

National Institute of Standards and Technology

NIST Framework Graphic

Cyber Assessment Framework (CAF)

National Cyber Security Centre

CAF Framework Graphic
Edit Template

More from NCD​

A Strategic Guide for Building Cyber Resilience

Cyber resilience is a strategic necessity. Discover five key strategies to minimize cyber incident impacts and strengthen long-term security, based on insights from Dr. Jamie Saunders and the World...

Leadership & Cyber Resilience | Vol. l

Cyber security is a boardroom issue. John Noble shares essential non-technical questions that leaders must ask to strengthen cyber resilience and governance in today’s digital landscape...

NCD Cyber Threat Intelligence: Gelsemium APT Group

The China-linked Gelsemium APT group poses a growing cyber threat to Japanese organizations, targeting sensitive data through advanced malware. Learn how to protect your business from espionage...

How Japanese Organizations Can Overcome Ransomware Challenges

Ransomware attacks are exposing critical weaknesses in Japanese organizations. Learn how to overcome systemic security barriers, enhance resilience, and implement proactive cyber security strategies...

Beyond Dollars: The True Impact of Cyber Attacks

Cyber attacks cause more than financial losses—they disrupt critical services, expose vulnerabilities, and threaten national security. Discover the true cost of cyber threats beyond dollars in this...
Edit Template