2026 Futuriom 50: Highlights →Explore

Executive Summary

In the endless chess game of cybersecurity, the Russian-speaking QILIN (formerly Agenda) group has just made a checkmate-worthy move. In 2025, it’s the most active ransomware operation worldwide. Like the mythical Chinese Qilin it’s named after, this malware is powerful, adaptable, and unfortunately—very real.

And yes—before diving into the weeds—let’s acknowledge the irony: naming your ransomware after a symbol of “peace and prosperity” is either top-tier trolling or some dark attempt at branding. Either way, it’s working far too well.


The Rise of the Dragon: QILIN’s Meteoric Ascent

QILIN didn’t stumble into dominance; it engineered it. The group began as Agenda ransomware in July 2022, then rebranded to QILIN in September that year with a full architectural migration from Golang to Rust. That move wasn’t cosmetic—it marked a technical revolution.

Key Milestones

  • $50+ million in confirmed ransom payments (2024)

  • 1,700+ attacks with FBI-estimated revenue of $91M (likely underreported)

  • Operations spanning 25+ countries across six continents

  • Three consecutive months leading global ransomware activity (May–July 2025)

Like a Silicon Valley startup (albeit an evil one), QILIN runs a slick Ransomware-as-a-Service (RaaS) model:

  • Affiliate programs with 80–85% revenue sharing

  • 24/7 “legal support” (yes, there’s a “Call Lawyer” button)

  • In-house “journalists” for extortion campaigns

  • Automated propagation and negotiation tooling

QILIN is less a ransomware gang and more a criminal SaaS company with a very dark business model.


The Numbers Don’t Lie: QILIN’s Market Dominance

2025 Landscape

Source: ransomware.live

QILIN is officially the dragon at the top of the food chain.

Industry Targeting

Geography

Source: ransomware.live


Technical Architecture: The Devil in the Rust

Core Variants

  • QILIN.A (2022 – Golang era)

    • Cross-platform (Windows/Linux)

    • Basic encryption, limited evasion

  • QILIN.B (2024–present – Rust era) A quantum leap in sophistication.

// Simplified Encryption Stack AES-256-CTR + ChaCha20 + RSA-4096 (OAEP padding)

Encryption Highlights:

  • AES-256-CTR for speed

  • ChaCha20 for modern stream cipher performance

  • RSA-4096 with OAEP for asymmetric key protection

  • Configurable modes: normal, step-skip, fast, percent

Evasion & Anti-Forensics Toolkit:

  • Process injection

  • Event log clearing & shadow copy deletion

  • Self-deletion post-execution

  • Chrome extension credential theft

  • Obfuscated APIs & dynamic loading

Tactical Innovations

  1. Legal Warfare – “Call Lawyer” button weaponizes compliance and fines.

  2. Fortinet Exploits – Automation of CVE-2024-21762 & CVE-2024-55591.

  3. Linux Gunra Variant – 100 parallel threads, forensic resistance, stealth mode (no ransom note).


Attack Lifecycle: QILIN’s Playbook

  • Initial Access: spearphishing, RMM abuse, VPN compromise, public app exploits, MFA fatigue

  • Privilege Escalation: LSASS dumping, valid account abuse, SMB/RDP traversal, PowerShell AD enumeration

  • Data Exfil & Encryption: MEGA staging, FTP transfers (>700 GB observed), parallelized encryption (100+ threads Linux variant)


Case Study

In February 2024, QILIN crippled a known UK-based pathology provider:

  • $50M ransom demand

  • 400 GB of medical data stolen

  • 170 cases of patient harm, including one confirmed death

  • 6,000+ cancelled procedures across NHS hospitals

Adding insult to injury, QILIN issued an apology:

“We are very sorry… Herewith we don’t consider ourselves guilty…”

Yes, the dragon apologized—sort of. A reminder that even cybercriminals know crossing into physical harm risks existential blowback.


End-To-End MITRE Mapping & Detection Opportunities

Phase

MITRE Technique

Attack Details

Detection Method

Security Control Category

Detection Signatures / Telemetry

INITIAL ACCESS

T1566.001/002 – Phishing (Malicious Attachments/Links)

Malspam with .zip, .scr, Office macros; links redirect via shorteners → exploit kits

Email header analysis, sandbox detonation, DNS sinkholing

SEG (Secure Email Gateway), CASB, DNS Security

Suspicious attachments (.exe, .scr, .vbs, .js, .iso); URL redirect chains

T1190 – Exploit Public-Facing Application

Exploitation of Veeam CVE-2023-27532, exposed RDP/web servers

WAF logs, CVE-specific IOC matching, brute-force login monitoring

WAF, IPS, VM (Vulnerability Management)

Abnormal POSTs to /veeam/backup; CISA KEV IOCs; automated exploit headers

T1133 – External Remote Services

VPN compromise with stolen creds, MFA bypass, session hijacking

VPN log correlation, UEBA login analysis

IAM, SIEM, UEBA

Impossible travel logins; concurrent sessions; multiple login failures

T1078.002 – Valid Accounts (Domain/Admin)

MFA fatigue, SIM swapping, golden ticket attacks

Kerberos log analysis, privilege escalation monitoring

IAM, UEBA, SIEM

Event ID 4769; MFA push fatigue; new admin group memberships

EXECUTION

T1059.001/003 – Command & Scripting Interpreter (PowerShell/CMD)

Discovery, AD enumeration, Safe-Mode persistence

Script block logging (Event ID 4104), Sysmon rules

EDR, SIEM

PowerShell -EncodedCommand; Get-ADUser, Get-ADGroupMember usage

T1569.002 – System Services (Service Execution: PsExec)

Lateral propagation via PsExec

Sysmon Event ID 7045 (service install), network mapping

EDR, SIEM, NDR

Service name PSEXESVC; multi-host service creation/removal

DEFENSE EVASION

T1055 – Process Injection

Injection into explorer.exe, svchost.exe

Memory forensics, Sysmon Event ID 8 (CreateRemoteThread)

EDR, Memory Forensics

Hollowed processes; mismatched PE headers; cross-process memory writes

T1027 – Obfuscated/Encrypted Files/Information

Rust-packed binaries, API obfuscation, junk code

Sandbox detonation, static RE

Sandbox, Reverse Engineering

High-entropy binaries; API import hashing

T1070 – Indicator Removal on Host

Log clearing, self-deletion

Event log tampering detection, forensic timeline analysis

SIEM, Forensic Tools

Event ID 1102 (log cleared); sudden log volume drop

T1490 – Inhibit System Recovery (VSS Deletion)

vssadmin delete shadows, wmic shadowcopy delete

VSS auditing, registry monitoring

EDR, Backup Monitoring

CLI matches vssadmin & wmic shadow deletion

CREDENTIAL ACCESS

T1003.001 – OS Credential Dumping (LSASS)

LSASS memory dumping (Mimikatz, derivatives)

Sysmon Event ID 10 (ProcessAccess), LSASS protection

EDR, Identity Protection

Handles opened to lsass.exe; unsigned processes accessing LSASS

Browser Stealer – Chrome Credentials

Theft from Chrome profile, extension abuse

File integrity monitoring, extension whitelisting

EDR, FIM, CASB

Access to Login Data SQLite DB; modified manifest.json

COLLECTION & EXFILTRATION

T1041 – Exfiltration over C2 Channel (FTP)

>783GB exfiltrated via FTP → 194.165.16[.]13

NetFlow/DPI, anomaly-based DLP

DLP, NDR, IPS

Large FTP uploads; outbound traffic to blacklisted IP

T1567.002 – Exfiltration to Cloud Storage (MEGA)

Data staged → ~30GB uploads to MEGA

CASB, API call inspection, proxy logs

CASB, DLP

mega.nz connections; cloud storage API overuse

COMMAND & CONTROL

T1071.001 – Application Layer Protocol: Web (HTTPS)

Cobalt Strike beacons, SystemBC SOCKS5 proxies

JA3/SNI fingerprinting, beacon timing analysis

NGFW, NDR, Proxy

Known CS JA3 hashes; long-lived TLS with low throughput

IMPACT

T1486 – Data Encrypted for Impact

Rust-based encryptor, 100+ threads, .qilin extension

File entropy monitoring, rapid file I/O

EDR, File Integrity Monitoring, DLP

Sudden entropy spike; mass file renaming; ransom notes (README.txt, .qilin, .agenda)


Defense Digest:

  • Patch & Harden Systems – Regularly update OS, applications, and firmware to close exploitable vulnerabilities.

  • Zero Trust Access – Enforce least privilege, MFA, and segmentation to limit lateral movement.

  • Offline & Immutable Backups – Maintain encrypted, offline/offsite backups with regular recovery testing.

  • Email & Web Filtering – Block malicious attachments, links, and exploit delivery channels.

  • Network Segmentation – Isolate critical workloads and restrict SMB/RDP traffic exposure.

  • Endpoint Protection & EDR – Apply behavior-based defense with automated response capabilities.

  • User Awareness & Drills – Train employees on phishing/social engineering and conduct tabletop exercises.

  • Incident Readiness – Have a tested ransomware playbook with defined contacts, containment, and recovery procedures.


Conclusion: The Dragon’s Reign and Our Response

QILIN’s success blends technical excellence, startup-like business ops, and ruthless opportunism. But empires fall—especially when they attract too much light. Healthcare attacks invite nation-state retaliation, and affiliate models leave breadcrumbs.

For defenders, the path forward is clear:

  • Hunt proactively across the kill chain

  • Share intelligence to trace affiliates

  • Architect with resilience-first principles

  • Drill responses like lives (and businesses) depend on it—because they do


Track recent breaches, security incidents, and critical vulnerabilities—get the latest updates, impact analysis, and cloud-ready mitigation steps in one place. View Recent Breaches & Vulnerabilities.

Reference

  1. https://blog.qualys.com/vulnerabilities-threat-research/2025/06/18/qilin-ransomware-explained-threats-risks-defenses

  2. https://www.checkpoint.com/cyber-hub/threat-prevention/ransomware/qilin-ransomware/

  3. https://www.darktrace.com/blog/a-busy-agenda-darktraces-detection-of-qilin-ransomware-as-a-service-operator

  4. https://www.cybereason.com/blog/threat-alert-qilin-seizes-control

  5. https://blog.barracuda.com/2025/07/18/qilin-ransomware-growing

  6. https://cyble.com/blog/ransomware-groups-july-2025-attacks/

Deepak Mangipudi
Deepak Mangipudi

Staff Engineer - Detection and Response, Aviatrix

Deepak is a Staff Engineer, Detection & Response at Aviatrix, specializing in detection engineering and adversary behavior analysis. He collaborates with cross-functional teams to identify emerging threats, design high-signal detections, and strengthen response capabilities across complex cloud and hybrid infrastructures.

PODCAST

Altitude

Secure The Connections Between Your Clouds and Cloud Workloads

Leverage a security fabric to meet compliance and reduce cost, risk, and complexity.

Cta pattren Image