The DragonForce ransomware operation has added "Champion Homes" to its dark web leak site, posted 2026-04-21 at 11:28:05 UTC. The listing carries a claim URL but no public file tree, screenshots, or ransom figure. Notably, independent reporting has flagged DragonForce listings as historically including unverified or fabricated victim entries, and the leak page content references an Australian residential builder operating in Greater Sydney and Illawarra, not the US publicly-traded manufactured housing firm of the same name. Defenders tracking either entity should treat this listing as unconfirmed pending corroboration.
What Happened
DragonForce published a new victim entry naming "Champion Homes" on its Tor-hosted blog. The post follows the group's standard template: a short victim profile, a claim link, and an implicit countdown to data publication. No proof pack, sample documents, or directory listings appear to have been attached to the entry at the time of indexing. The post is the only public artifact of the alleged compromise; no statement, SEC disclosure, or media confirmation from a Champion Homes entity has been published in connection with it.
Crucially, the leak page narrative describes a residential construction company "based in Australia, with active work in the Greater Sydney and Illawarra regions" specializing in custom designs and project home builds. That profile does not match Champion Homes Inc. (NYSE: SKY), the Michigan-headquartered manufactured housing builder. Either DragonForce is targeting a similarly named Australian builder, has misattributed its victim profile, or is recycling generic content, all of which are common patterns on the group's leak site.
What Was Taken
Nothing has been published or sampled. The leak page contains no file inventory, no document previews, and no claim of specific data categories such as employee PII, customer financial records, design documents, or supplier contracts. There is no stated volume in gigabytes or document count, and no claim of source code, backups, or domain controller exfiltration. Until DragonForce posts a proof pack or a partial dump, the scope of any actual data theft remains entirely unverifiable.
Why It Matters
DragonForce has spent the past year operating an affiliate-driven ransomware-as-a-service program and a "cartel" branding model, but its leak site has been increasingly polluted with low-quality and fabricated entries. BankInfoSecurity and others have documented cases where DragonForce listings appear to be scam or branding posts rather than genuine intrusions. For threat intel teams, that means a DragonForce listing is a lead, not a finding. For Champion Homes Inc. shareholders, customers, and partners, the listing should prompt internal verification but not public attribution until evidence emerges. For Australian residential builders carrying the Champion name, the same applies, with added urgency given the geographic match in the leak page text.
The Attack Technique
DragonForce affiliates have historically relied on a mix of initial access broker purchases, exposed RDP and VPN endpoints, exploitation of unpatched edge devices (notably SonicWall and Ivanti appliances), and phishing for credentials. Once inside, affiliates typically deploy Cobalt Strike or Sliver beacons, abuse legitimate remote management tooling such as AnyDesk and ScreenConnect, escalate via Mimikatz or Kerberoasting, and exfiltrate via Rclone or MEGA before detonating the locker. None of this is confirmed for the Champion Homes listing, which contains no IOCs, ransom note text, or technical artifacts at this time.
What Organizations Should Do
- Verify whether any entity in your supply chain trades under a "Champion Homes" name, particularly Australian residential builders, and reach out through trusted channels rather than relying on the leak page.
- Treat DragonForce listings as unverified leads. Require independent corroboration (proof pack, victim statement, or technical evidence) before issuing customer notifications or attributing an incident.
- Audit edge appliances, especially SonicWall, Ivanti Connect Secure, Fortinet, and Citrix gateways, against the latest CISA advisories and vendor patches given DragonForce affiliate tradecraft.
- Hunt for Rclone, MEGAcmd, AnyDesk, and ScreenConnect execution outside of approved IT inventory, and alert on large outbound transfers from file servers and backup hosts.
- Enforce phishing-resistant MFA on all remote access surfaces and disable legacy single-factor VPN and RDP exposure.
- Validate offline, immutable backups and rehearse a ransomware tabletop that includes a leak site listing without confirmed intrusion as a scenario branch.
Sources: [DRAGONFORCE] - Ransomware Victim: Champion Homes - RedPacket Security