The Qilin ransomware group, a prominent Ransomware-as-a-Service (RaaS) operation, has claimed responsibility for a cyberattack against the City of Napoleon, Ohio. The claim was made on the group's dark web data leak site on April 23, 2026. In a classic double extortion scheme, the group has threatened to release sensitive municipal data exfiltrated during the attack if the city fails to pay a ransom. This attack underscores the ongoing vulnerability of local government entities, which are often targeted due to their limited cybersecurity resources and the critical nature of the services they provide.
The Qilin ransomware group has been one of the more active players in the ransomware landscape. The attack on the City of Napoleon is part of a broader campaign, with reports noting that Qilin claimed five new victims in a single 24-hour period.
The group's modus operandi typically involves the following stages:
For a municipality like the City of Napoleon, the stolen data could include personally identifiable information (PII) of residents and employees, financial records, and other sensitive government documents. The public release of such data could lead to widespread identity theft and a severe loss of public trust.
While the specific initial access vector for this attack is unknown, Qilin's TTPs are well-documented and align with common ransomware attack chains:
T1566 - Phishing) and exploit public-facing applications (T1190 - Exploit Public-Facing Application) to gain their initial foothold.T1567.002 - Exfiltration to Cloud Storage.T1486 - Data Encrypted for Impact.T1490 - Inhibit System Recovery.The targeting of smaller municipalities is a strategic choice for ransomware groups. These entities often lack the budget and personnel for a robust cybersecurity program, making them softer targets, yet the services they provide are critical enough that the pressure to restore them quickly is immense.
A ransomware attack on a city government can have devastating consequences for the community. The immediate impact is the disruption of essential public services, which could include anything from utility billing and payroll to police and emergency services dispatch systems. The city faces significant financial costs, including incident response services, network restoration, potential credit monitoring for affected residents, and the possible ransom payment itself. The exfiltration and potential leak of resident and employee PII can lead to long-term harm and legal liability for the city. The overall impact is a combination of operational paralysis, financial strain, and a severe breach of public trust.
No specific Indicators of Compromise (IOCs) such as IP addresses, domains, or file hashes were mentioned in the source articles.
Security teams can hunt for signs of a pre-ransomware intrusion with the following methods:
Large Data Uploadsvssadmin delete shadowsrclone.exerclone for bulk data exfiltration to cloud services. Its presence and execution in an environment where it's not normally used is highly suspicious.*.qilinEarly detection of pre-ransomware activity is crucial.
D3-NTA: Network Traffic Analysis.If ransomware is detected, the immediate response is to isolate the affected systems from the rest of the network to stop the encryption from spreading. This can be done by unplugging network cables or using an EDR's host isolation feature. The incident response plan should then be activated, and communication with incident response professionals should be initiated.
Defending against ransomware requires a multi-layered approach:
D3-SU: Software Update).D3-NI: Network Isolation).Qilin ransomware group escalated attacks, claiming 19 new victims in 24 hours, including Winona County, MN, and Harrison County, WV, with global reach.
The Qilin ransomware group has significantly escalated its operations, claiming 19 new victims within a 24-hour period around April 25, 2026. This aggressive campaign includes major disruptions to US public sector entities like Winona County, Minnesota, and Harrison County, West Virginia, which confirmed network outages. The attacks demonstrate a global reach, impacting organizations in Sweden and Japan, and targeting diverse sectors beyond government, such as Financial Services and Agriculture. This indicates a broader and more opportunistic targeting strategy by the group, increasing the overall threat landscape.
The Qilin ransomware group claimed responsibility for the attack on the City of Napoleon, Ohio.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.