Qilin Ransomware

Description

Qilin is a ransomware group that operates a Ransomware-as-a-Service (RaaS) model and surfaced around mid-2022. The group initially came out as “Agenda” but named rebranded as “Qilin” a few months later. The origin of the name “Qilin” is unknown, but what is certain is that a user named “Qilin” promoted the Agenda ransomware.

Qilin’s target set spans multiple regions. The industries impacted are diverse and include sectors often considered critical or resource intensive such as energy and healthcare. The group employs a double-extortion tactic, in which it does not only encrypts victim data but also steals it and threatens publication.

Qilin has introduced a “Call Lawyer” feature in its affiliate portal in mid-2025. When an affiliate invokes it during ransom negotiations, the feature connects the affiliate with alleged legal counsel, which remains unproven, supplied by ransom operator. This feature is designed to pressure victims into paying by providing legal-surrounding arguments and threatening posture, not to assist victims.

In September 2025, the ransomware group “DragonForce” announced that Qilin, alongside LockBit, had joined their ransomware cartel. However, that claim has not been verified.

Aliases

  • QilinCrypt
  • Agenda
  • Qilin Ransomware Operators
  • Qilin Locker
  • Qilin ransomware group
  • Qilin ransomware Operators

Common Vulnerabilities and Exposures

Targeted Industries

  • Education
  • Government (Local/Municipal)
  • Healthcare
  • Home Users
  • Media and Entertainment
  • Small and Medium Businesses (SMBs)

Objectives

Financial Gain

Known Tools Used

  • 7-Zip
  • Brute-force tools
  • Custom scripts
  • Exploit kits
  • SMB scanners
  • TOR
  • Web shells

Known Infection Vectors

  • Brute-force attacks
  • Compromised RDP/VPN credentials
  • Fake software updates
  • Initial Access Brokers (IABs)
  • Malicious ads (malvertising)
  • Managed Service Provider (MSP) breaches
  • Misconfigured cloud services
  • Phishing (malicious emails/attachments)
  • Supply chain attacks
  • Third-party app exploits (e.g.TeamViewer/AnyDesk)
  • USB/Removable media
  • Vulnerability exploits
  • Watering hole attacks

References

Ransomware Roundup: Snatch, BianLian and Agenda (Fortinet)
https://www.fortinet.com/blog/threat-research/ransomware-roundup-snatch-bianlian-and-agenda

Qilin (MITRE)
https://attack.mitre.org/software/S1242/

Qilin Top Ransomware Threat to SLTTs in Q2 2025 (Center for Internet Security)
https://www.cisecurity.org/insights/blog/qilin-top-ransomware-threat-to-sltts-in-q2-2025

Active CVEs