Threat Actor Characterization
You’re viewing the read-only version.
Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
DevMan
ID: 38010cb4afb2f2b4f97a852776090b9338942
Crimeware
Ransomware
Threat types: Malware, Ransomware, RaaS, Intrusion, Phishing
Progress: 83%
Completeness: 89%
Freshness: 70%
Operation zone: Brazil, Canada, France, Greece, Japan, Singapore, South Africa, Spain, Thailand, United Kingdom, Vietnam
Aliases
Limited alias preview
| DragonForce | — | — | — |
Actor Network Graph
Open Network GraphMITRE ATT&CK®
confidence: medium
DevMan is a ransomware variant/cluster reported since 2025 and commonly described as DragonForce-linked. Official alerting on DevMan 2.0 describes double extortion, common access routes (compromised credentials, phishing, exposed services), SMB admin-share lateral movement, recovery inhibition (shadow copy deletion), and Tor extortion infrastructure.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1078 | Valid Accounts | TA0001 TA0003 TA0004 TA0005 |
|
| T1566 | Phishing | TA0001 |
|
| T1190 | Exploit Public-Facing Application | TA0001 |
|
| T1021.002 | SMB/Windows Admin Shares | TA0008 |
|
| T1490 | Inhibit System Recovery | TA0040 |
|
| T1486 | Data Encrypted for Impact | TA0040 |
|
Executive brief
now
Saved successfully.
Hunting Playbook
now
Saved successfully.
IOC Appendix
now
Saved successfully.
OSINT Library
now
Saved successfully.