The Qilin ransomware group has significantly escalated its operations in October 2025, claiming responsibility for a series of attacks against a diverse set of victims across the globe. Security researchers report that the group's data leak site has been updated with numerous new entries, including organizations from the United States, France, and Africa. The targets span multiple industries, including insurance, healthcare, real estate, government, and utilities. This recent wave of attacks underscores the growing threat posed by the Qilin Ransomware-as-a-Service (RaaS) operation, which appears to be well-supported by a robust and resilient underground hosting infrastructure, enabling its continued campaigns despite law enforcement efforts against such services.
Qilin operates a RaaS model, providing its malware and infrastructure to affiliates who carry out the attacks in exchange for a share of the profits. This model allows for a high volume and wide variety of attacks.
Recent Claimed Victims (October 2025):
This diverse victimology, ranging from critical infrastructure (electric co-ops) to public authorities and private companies, demonstrates that Qilin and its affiliates are largely opportunistic, targeting any organization they can successfully breach.
While the specific TTPs for each of these new breaches are not detailed, Qilin campaigns typically follow a standard ransomware attack lifecycle. Affiliates often gain initial access through common vectors and then deploy the ransomware for maximum impact.
T1566 - Phishing is a common entry point. Affiliates also frequently use T1190 - Exploit Public-Facing Application by scanning for and exploiting unpatched vulnerabilities in systems like VPNs or RDP.T1059.001 - PowerShell is often used to execute payloads and carry out tasks in a fileless manner.T1053.005 - Scheduled Task/Job: Scheduled Task or creating new user accounts.T1562.001 - Impair Defenses: Disable or Modify Tools. Ransomware operators frequently attempt to disable antivirus and EDR solutions before deploying the encryptor.T1021.001) are used to spread across the network.T1486 - Data Encrypted for Impact. The core of the attack, where the Qilin encryptor is run on as many systems as possible.T1041 - Exfiltration Over C2 Channel. Before encryption, data is stolen to be used in double extortion tactics.Security firm Resecurity notes that Qilin's operations are supported by resilient bulletproof hosting providers in Russia and Hong Kong, making infrastructure takedowns difficult.
The impact of these attacks is severe and multi-faceted:
vssadmin.exe delete shadows), or rapidly encrypt large numbers of files.Qilin claims 7 new victims in 24 hours, showing continued high activity and targeting professional services and manufacturing.
The most important mitigation against ransomware is having tested, offline backups to enable recovery without paying the ransom.
Enforcing MFA on VPNs, RDP, and other remote access services prevents attackers from using stolen credentials for initial access.
Mapped D3FEND Techniques:
Segmenting the network can contain a ransomware outbreak and prevent it from spreading to critical assets.
Mapped D3FEND Techniques:
Training users to recognize and report phishing emails helps to block a primary initial access vector for ransomware affiliates.
The primary and most essential defense against a Qilin ransomware attack is to maintain a comprehensive and tested backup strategy. Implement the 3-2-1 rule: at least three copies of critical data, stored on two different types of media, with one copy held off-site and offline (air-gapped) or in immutable cloud storage. This ensures that if Qilin's affiliates successfully encrypt your network, you have a clean, uncompromised copy of your data for restoration. It is critical to regularly test your backup restoration process to verify data integrity and ensure you can meet your Recovery Time Objectives (RTO). This countermeasure directly negates the primary leverage of the ransomware (data encryption) and allows the organization to recover without paying a ransom.
To defend against the common initial access vectors used by Qilin's affiliates, such as compromised credentials for VPN or RDP, organizations must enforce phishing-resistant Multi-Factor Authentication (MFA) across all remote access services and for all privileged accounts. This includes administrative access to servers, network devices, and cloud environments. By requiring a second factor of authentication, you prevent attackers from gaining access even if they manage to steal a valid username and password through phishing or other means. This simple but highly effective control is one of the most impactful measures for preventing ransomware attacks at the initial access stage.
Deploy an EDR solution to detect the precursor activities common to Qilin and other ransomware attacks. Configure specific detection rules to alert on the execution of commands used to inhibit system recovery. The most critical one to monitor is the use of vssadmin.exe delete shadows or equivalent PowerShell commands to delete Volume Shadow Copies. This action is almost always malicious and is a strong indicator that a ransomware payload is about to be executed. Creating a high-priority alert for this specific activity can give the security team a crucial, albeit short, window to intervene and isolate the affected host before the encryption process begins across the network.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats