DevMan Ransomware: The Rise of DragonForce’s Successor

DevMan Ransomware is rapidly emerging as a highly active threat. Explore its Conti roots, evolving attack tactics, targeted industries, and critical IOCs to detect and defend against ongoing campaigns.

Xcitium Advanced EDR
  • January 29, 2026

DevMan Ransomware is rapidly emerging as a highly active threat. Explore its Conti roots, evolving attack tactics, targeted industries, and critical IOCs to detect and defend against ongoing campaigns.

The Emergence of DevMan Ransomware: A New RaaS Player

DevMan Ransomware is one of the most prominent rising threats of 2026. This operation is one of the fastest-growing ransomware operations that has quickly become one of the biggest players in the Ransomware as a Service (RaaS) field. The group first appeared in April 2025 but soon changed its model from a closed operation to a full-fledged RaaS with many different affiliates joining the operation.

The ransomware is not new but comes from a very infamous background. The code of the DevMan ransomware is directly linked to the infamous DragonForce and Conti ransomware groups. This indicates that the group is likely very powerful and comes from the ranks of very experienced cybercriminals. The first version of the malware was unusual in that it encrypted its own ransom notes. This did not stop the group from achieving great success in the future.

From Affiliate to Cartel: The Evolution of a Threat

History & Evolutionary Roots

TRACING THE GENETIC CODE FROM CONTI TO DEVMAN
LEGACY Conti Op The foundation. Code fractured but surfaced in new forms.
2023-24 DragonForce Direct code successor and technical base for variants.
2025 DevMan Emerging Refined variant leveraging years of attack development.
CURRENT RaaS Pivot Transition to distributed deployment structure.

Operational Structure

Developer & Infrastructure Focus

Core developers concentrate strictly on malware refinement, leaving execution to specialized affiliates.

The Cartel Framework

Allows affiliates to “white-label” the payload, leading to unique variants that bypass standard defenses.

Decentralized Attribution

Unique variants and distinct deployment methods make unified defense and global tracking highly complex.

2025
The RaaS Turning Point

“The transition to a RaaS model marked a significant turning point, shifting from direct operations to a high-volume platform structure.”

🏴‍☠️
Cartel Model Active
Multi-variant deployment capability enabled.

The foundation of this group can be attributed to the remnants of the Conti operation, which, despite its fragmentation, continued with the code and affiliates in new forms. Among the most prominent forms was the DragonForce, and DevMan was one of the direct variants of this code. As such, this group has the advantage of years of development and refinement in attacks.

The shift to the RaaS in late 2025 was a major turning point in the evolution of this operation. This allows the core developers to focus on developing the malware and infrastructure, leaving the actual attacks and victim handling to the affiliates.

As such, the number and frequency of attacks have been greatly amplified. This RaaS operates on a “cartel” concept, allowing affiliates to create their own unique variants of the payload.

Who is at Risk? Targeted Industries and Global Reach

Organizations in these fields must heighten their defensive posture immediately. The group has claimed over 180 victims since its inception, showcasing its operational scale.

Threat Level: Critical

DevMan Intel Dashboard

180+ Total Confirmed Victims
Geographic Strike Density
Sector Impact Distribution

Latest Attacks

Target Entity Threat Actor Intelligence Metadata Breach Summary
consultaegis.com Devman Disc: 2026-01-29
Est: 2026-01-26
National security materials including BIO laboratory blueprints, facility details…
zallc.org Devman Disc: 2026-01-29
Est: 2026-01-28
PII data, SSN’s financial and audit reports….
***vandenberg.com Devman Disc: 2026-01-28
Est: 2026-01-26
Client data, HR records, internal communications…
**ps.net Devman Disc: 2026-01-28 N/A – Preliminary discovery phase.
tiw-group.com Devman Disc: 2026-01-28 Specialist software firm with 30+ years experience. Source code and proprietary dev logs compromised.
z*l*c.o*g Devman Disc: 2026-01-28 PII data, SSN’s financial and audit reports….

Technical Breakdown: Encryption and Behavior

Devman employs the highly secure AES-256 encryption algorithm in CBC mode to encrypt the victim files. Additionally, the malware employs RSA-2048 asymmetric encryption to encrypt the AES keys. This is the standard practice for contemporary ransomware.

DevMan has also employed sophisticated techniques to ensure maximum speed and evasiveness. For example, the malware variants employ header-only encryption. In this form of encryption, the malware encrypts only the header of the file. This form of encryption ensures the malware’s speed and allows it to compromise massive amounts of data within a short time.

Technical Schematics

DevMan Malware Execution & Cryptography

AES-256-CBC Symmetric
RSA-2048 Asymmetric
Robust multi-layered scheme ensures high entropy and zero recovery without keys.
Header-Only Logic 94% Speed

Prioritizes file start encryption to compromise large storage volumes in minimal time.

Shadow Copies Purged
Backups Targeted
WinRE Functions Inhibited
C2 Dependency: NONE
Autonomous Execution
Can trigger full encryption without active Command & Control connection.

It has also been developed with an offline execution model. This means that the ransomware does not need an internet connection to the C2 server to initiate the encryption process. This makes the ransomware difficult to detect and prevent while it is in the process of attacking the system.

Moreover, it’s been developed with the anti-recovery mechanism. For instance, the malware executes commands that prevent the system from being restored. It achieves this by deleting the shadow copy and the backup files. This forces the victims to pay the ransom because the anti-recovery mechanism disables the system’s normal recovery processes.

MITRE ATT&CK Tactics, Techniques, and Procedures (TTPs)

Tactic Technique Description
Initial Access (TA0001) T1210
T1078
Exploitation of Remote Services: Exposed remote services such as RDP or management interfaces are abused to gain an initial foothold inside the environment without physical access.
Valid Accounts: Compromised or reused credentials enable access through legitimate authentication mechanisms, allowing entry without triggering exploit-based alerts.
Execution (TA0002) T1059.001
T1203
PowerShell: Native PowerShell functionality is used to run commands, deploy payloads, and automate actions while blending in with normal administrative activity.
Exploitation for Client Execution: Vulnerabilities in client-side applications are leveraged to execute arbitrary code on the target system.
Persistence (TA0003) T1078 Valid Accounts: Continued access is maintained by reusing legitimate credentials, ensuring the ability to reconnect even after system restarts or partial cleanup.
Privilege Escalation (TA0004) T1068 Exploitation for Privilege Escalation: Local software flaws or misconfigurations are exploited to elevate access from a standard user to administrative or system-level privileges.
Defense Evasion (TA0005) T1036
T1562
Masquerading: Files, processes, or services are deliberately named or structured to resemble legitimate components, reducing the chance of raising suspicion.
Impair Defenses: Security controls such as endpoint protection, logging, or monitoring features are disabled or altered to limit visibility into malicious activity.
Credential Access (TA0006) T1003 OS Credential Dumping: Authentication material is extracted from memory or system credential stores, enabling account takeover and further network access.
Discovery (TA0007) T1018
T1046
T1082
Remote System Discovery: Networked systems are identified to map the internal environment and locate potential lateral movement targets.
Network Service Scanning: Active services and open ports are enumerated to understand reachable systems and exposed functionality.
System Information Discovery: Host-level details such as operating system version, hostname, and hardware attributes are collected to guide next-stage actions.
Lateral Movement (TA0008) T1021.002 SMB / Windows Admin Shares: Administrative shares are used to move between systems using valid credentials and existing Windows file-sharing mechanisms.
Collection (TA0009) T1005 Data from Local System: Files and sensitive data are gathered directly from compromised hosts in preparation for exfiltration or encryption.
Exfiltration (TA0010) T1041 Exfiltration Over C2 Channel: Collected data is transferred out of the environment through an established command-and-control communication path.
Impact (TA0040) T1486
T1490
T1491
Data Encrypted for Impact: Data and systems are encrypted to disrupt operations and pressure victims into paying a ransom.
Inhibit System Recovery: Backup files and recovery mechanisms are removed or disabled to limit restoration options.
Defacement: Visible artifacts such as ransom notes or modified content are introduced to signal compromise and communicate demands.

Case Study: Xcitium vs. DevMan Ransomware

This demonstration illustrates how Xcitium defends systems against ransomware in real time using a prevention-first approach. 37 live Devman ransomware samples are executed in a controlled environment to simulate a realistic multi-payload attack scenario.

Instead of relying on signatures, reputation, or post-execution detection, Xcitium’s ZeroDwell isolation technology automatically identifies each Devman payload as untrusted at launch and immediately places it into isolation.

As a result, Devman is unable to complete its attack chain. File encryption attempts are blocked, backups remain intact, and no command-and-control communication is established even though the samples are fully functional and previously unseen.

By eliminating the exposure window entirely, Xcitium ensures the endpoint remains fully operational and uncompromised. This video demonstrates how modern ransomware threats like Devman are neutralized instantly through continuous, zero-trust execution and real-time isolation.

Indicators of Compromise (IOCs) for Network Defense

Identifying and blocking the infrastructure used by DevMan affiliates is a critical defensive measure. Indicators of Compromise (IOCs) are forensic artifacts that signal a potential breach or ongoing attack. Consequently, organizations should integrate these indicators into their security monitoring tools immediately.

Devman Ransomware Website

The following IOCs have been associated with DevMan operations :

  • 83.217.209.210
  • 38.132.122.213
  • 38.132.122.214
  • TOX ID: 9D97F166730F865F793E2EA07B173C742A6302879DE1B0BBB03817A5A04B572FBD82F984981D
  • Website: devmanblggk7ddrtqj3tsocnayow3bwnozab2s4yhv4shpv6ueitjzid.onion
  • Twitter/X: @Inifintyink
Devman Ransom Note

These indicators provide actionable intelligence for network defenders. For example, blocking traffic to these IP addresses can disrupt communication with the attacker’s C2 infrastructure. Therefore, proactive threat hunting using these IOCs can help identify and contain an infection before it spreads.

DevMan Ransomware SHA-1 Samples & Zero‑Dwell Threat Intelligence Reports

Conclusion: DevMan Proves RaaS Is Now Built for Speed and Scale

DevMan is not just another ransomware strain, it is a high-volume RaaS operation built on proven code lineage tied to DragonForce and Conti, then amplified through affiliates and variant white-labeling. With 180+ claimed victims, it reflects a business model engineered for reach, pressure, and repeatable impact. 

Why This Threat Hits Hard

  • Affiliates drive constant attacks across industries, with Technology as the top target, and Healthcare and the Public Sector as high-pressure follow-ons. 
  • Strong encryption is paired with tactics that reduce response time, including fast encryption methods and offline execution. 
  • Recovery is deliberately weakened through shadow copy and backup disruption. 

Where Xcitium Changes the Outcome

For organizations protected by Xcitium Advanced EDR, DevMan fails at execution.

  • Unknown payloads are isolated the moment they run, even if they are never-before-seen. 
  • Encryption attempts cannot touch real files, operations remain stable, and recovery stays viable. 
  • In the demonstrated scenario, 37 live samples could execute, but code can run without being able to cause damage. 

Stop the Next Affiliate Before Impact

RaaS groups win when execution is allowed, even briefly. Eliminate that window, stop unknown code at runtime, and keep ransomware irrelevant.

Like what you see? Share with a friend.

Move Away From Detection With Patented Threat Prevention Built For Today's Challenges.

No one can stop zero-day malware from entering your network, but Xcitium can prevent if from causing any damage. Zero infection. Zero damage.

Book a Demo