The Agenda ransomware group, which also operates under the alias Qilin, has significantly evolved its tactics to conduct highly effective attacks against critical infrastructure. Research from Trend Micro reveals the group is now using a sophisticated cross-platform attack methodology, abusing legitimate remote access and backup tools to remain undetected. Key TTPs include deploying a Linux ransomware variant on Windows systems, using Bring Your Own Vulnerable Driver (BYOVD) techniques to disable security software, and stealing backup credentials to prevent recovery. The Agenda RaaS operation has impacted nearly 600 victims across 58 countries since January 2025, with a strong focus on manufacturing, technology, and healthcare sectors in developed nations.
The Agenda group's updated tactics demonstrate a focus on stealth and defense evasion:
T1219 - Remote Access Software.T1068 - Exploitation for Privilege Escalation) to disable or terminate endpoint security products. By exploiting a known vulnerability in a legitimate, signed driver, they can execute code with kernel-level privileges to kill antivirus processes.T1490 - Inhibit System Recovery). This allows them to disable or delete backups, increasing the pressure on the victim to pay the ransom.T1078 - Valid Accounts), which they use to blend in with normal network traffic and move laterally.The impact of an Agenda ransomware attack is severe, particularly for critical infrastructure operators:
No specific Indicators of Compromise (IOCs) were provided in the source reports.
Process Analysis.Enforce MFA on all remote access tools and privileged accounts to prevent attackers from using stolen credentials.
Mapped D3FEND Techniques:
Use application control and driver blocklisting to prevent the execution of unauthorized binaries and the loading of known vulnerable drivers used in BYOVD attacks.
To counter the Agenda group's use of Bring Your Own Vulnerable Driver (BYOVD) attacks, organizations must implement robust driver integrity checking. This can be achieved using modern EDR solutions and Windows Defender Application Control (WDAC). Create a policy that explicitly blocks the loading of known vulnerable drivers. Security vendors and community projects maintain lists of these drivers. By deploying a driver blocklist, you can prevent the attacker from loading the vulnerable driver they need to gain kernel-level privileges and disable your security tools. This is a proactive hardening measure that directly neutralizes one of Agenda's most dangerous TTPs.
The Agenda group's tactic of running a Linux ransomware binary on a Windows host is highly anomalous and detectable with proper process analysis. Security teams should configure their EDR/SIEM to generate a high-priority alert for any execution of the Windows Subsystem for Linux (wsl.exe) on critical servers, especially those that have no legitimate business reason to run Linux binaries. Furthermore, monitor for legitimate remote management tools (like AnyDesk, TeamViewer) being used to launch suspicious processes or transfer executables. Baselining normal tool usage and alerting on deviations is key to spotting this abuse of legitimate software.
To mitigate the threat of attackers stealing and using backup credentials, organizations must treat backup infrastructure with the same rigor as their primary domain controllers. Backup administrator accounts must be unique, not shared with domain admin accounts, and protected with MFA. The backup servers themselves should be on an isolated network segment, with highly restrictive firewall rules allowing access only from specific management consoles. By creating a separate credential and administrative tier for the backup environment, you can prevent an attacker who has compromised the primary domain from easily pivoting to and destroying your recovery capabilities.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats