Qilin Ransomware Gang Claims Attack on Italian Manufacturer Cressi

Russia-Linked Qilin Ransomware Gang Alleges Cyberattack Against Italian Manufacturer Cressi

HIGH
January 9, 2026
4m read
RansomwareThreat ActorCyberattack

Impact Scope

Affected Companies

Cressi

Industries Affected

ManufacturingRetail

Geographic Impact

Italy (national)

Related Entities

Threat Actors

Qilin LockBit DragonForce

Other

Cressi

Full Report

Executive Summary

The Russia-linked Qilin ransomware gang has added Cressi, a prominent Italian manufacturer of water sports equipment, to its darknet leak site, claiming to have successfully breached the company. At present, the threat actors have not released proof of the breach or a ransom demand deadline, a common tactic used to apply pressure on victims. Cressi has not yet issued a public statement confirming or denying the attack. Qilin remains one of the most active and dangerous ransomware-as-a-service (RaaS) operations, having previously targeted major organizations globally.


Threat Overview

Qilin is a ransomware group known for its double-extortion tactics, which involve encrypting a victim's files and exfiltrating sensitive data to be used as leverage. The group operates a RaaS model, providing its malware and infrastructure to affiliates who carry out the attacks in exchange for a share of the profits.

While details of the alleged attack on Cressi are scarce, Qilin's typical modus operandi involves:

  1. Initial Access: Gaining entry through methods like phishing, exploiting unpatched vulnerabilities in public-facing applications, or using stolen credentials.
  2. Reconnaissance and Lateral Movement: Mapping the victim's network, escalating privileges, and identifying high-value data and systems.
  3. Data Exfiltration: Copying large volumes of sensitive corporate and customer data to attacker-controlled servers.
  4. Encryption: Deploying the Qilin ransomware to encrypt files across the network, rendering systems unusable.
  5. Extortion: Leaving a ransom note and posting the victim's name on their leak site to demand payment for a decryptor and a promise to delete the stolen data.

The group has a history of targeting the manufacturing and healthcare sectors. In 2025, Qilin was behind major attacks on Habib Bank AG Zurich, MedImpact, Volkswagen Group France, and SK Telecom. Its capabilities were reportedly enhanced through partnerships with other notorious gangs like LockBit and DragonForce in late 2025.

Impact Assessment

If the claim is true, the impact on Cressi, a company with a global presence in over 90 countries, could be significant:

  • Operational Disruption: Encryption of manufacturing, logistics, and administrative systems could halt production and distribution.
  • Data Breach: The theft of intellectual property (e.g., product designs), financial data, employee information, and customer data would have severe consequences.
  • Financial Loss: The cost of remediation, business downtime, and a potential ransom payment would be substantial.
  • Reputational Damage: A public breach can damage a brand's reputation with partners and customers.

Detection & Response

  • Monitor for Telltale Signs: Security teams should hunt for common ransomware precursors, such as the presence of tools like Cobalt Strike, PsExec, or Mimikatz, and anomalous data aggregation and exfiltration activity.
  • Dark Web Monitoring: Organizations can use threat intelligence services to monitor darknet leak sites for mentions of their company name or data.
  • Endpoint Detection and Response (EDR): EDR tools are crucial for detecting and stopping the execution of ransomware binaries and the file encryption process. (D3-PA: Process Analysis).

Mitigation

  • Immutable Backups: Maintain offline and immutable backups of critical data and systems. Regularly test the restoration process to ensure recovery is possible after an attack.
  • Vulnerability Management: Aggressively patch public-facing systems and applications to close common initial access vectors. (D3-SU: Software Update).
  • Multi-Factor Authentication (MFA): Enforce MFA on all remote access points (VPNs, RDP) and for all privileged accounts to make credential theft more difficult.
  • Network Segmentation: Segment the network to prevent ransomware from spreading rapidly from the initial point of compromise to critical servers and backups.

Timeline of Events

1
October 1, 2025
Qilin reportedly partners with LockBit and DragonForce gangs, enhancing its capabilities.
2
January 9, 2026
This article was published

MITRE ATT&CK Mitigations

Maintain regularly tested, offline, and immutable backups to enable recovery from a ransomware attack without paying the ransom.

Aggressively patch vulnerabilities in internet-facing systems to prevent common initial access vectors used by ransomware groups.

Mapped D3FEND Techniques:

Enforce MFA on all remote access services (VPN, RDP) to protect against credential-based intrusions.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The cornerstone of ransomware resilience is a robust backup and recovery strategy. To defend against groups like Qilin, organizations must follow the 3-2-1 backup rule: three copies of data, on two different media types, with one copy stored offline and/or immutable. Immutability, offered by many modern backup solutions and cloud providers, is key, as it prevents the ransomware from encrypting or deleting the backups themselves. Recovery plans must be tested regularly to ensure that critical systems can be restored within acceptable timeframes (RTO/RPO). A proven ability to recover from backups removes the primary leverage of the attacker (operational disruption) and allows the organization to refuse the ransom demand for the decryptor.

Sources & References

Qilin ransomware gang alleges cyberattack against Cressi
SC Media (scmagazine.com) January 9, 2026
Weekly Intelligence Report – 09 January 2026
CYFIRMA (cyfir.com) January 8, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

QilinransomwareRussiamanufacturingdata leakdarknet

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading