Prolific Qilin Ransomware Gang Adds Jayeff Construction to its List of Victims

Qilin Ransomware Group Claims Attack on U.S. Contractor Jayeff Construction

HIGH
May 2, 2026
5m read
RansomwareThreat ActorData Breach

Related Entities

Threat Actors

Organizations

Other

Jayeff Construction

CVE Identifiers

Full Report

Executive Summary

The prolific Qilin ransomware group (also known as Agenda) has listed Jayeff Construction, a U.S.-based general contractor, as its latest victim on its official data leak site. The claim, which appeared around May 1, 2026, is indicative of a successful network compromise and data exfiltration, consistent with Qilin's double-extortion modus operandi. As a prominent Ransomware-as-a-Service (RaaS) operation, Qilin provides its malware and infrastructure to affiliates, who then carry out attacks on a wide range of industries, with a recent focus on exploiting vulnerabilities in Fortinet firewalls.


Threat Overview

Qilin has been one of the most active and dangerous ransomware gangs since emerging in 2022. It operates a RaaS model, enabling a broad network of affiliates to conduct attacks. The group is known for its sophisticated, customizable ransomware payloads written in both Go and Rust, which allows for cross-platform attacks targeting Windows, Linux, and VMware ESXi servers.

The attack on Jayeff Construction, a Florida-based company specializing in commercial and retail construction, fits Qilin's pattern of targeting various industries. The group's primary strategy is double extortion: affiliates first exfiltrate sensitive data (T1048 - Exfiltration Over Alternative Medium) before encrypting the victim's files (T1486 - Data Encrypted for Impact). The threat of leaking the stolen data on their leak site is used to coerce victims into paying the ransom.

Technical Analysis

While the specific details of the Jayeff Construction breach are not public, Qilin affiliates are known to employ a variety of TTPs. Recent campaigns have shown a strong preference for exploiting vulnerabilities in internet-facing devices for initial access.

  • Initial Access: Qilin affiliates are known to exploit critical vulnerabilities in Fortinet firewalls, such as CVE-2024-21762 and CVE-2024-55591, to gain an initial foothold on a target network (T1190 - Exploit Public-Facing Application). Phishing campaigns are also a common entry vector.
  • Execution & Encryption: The ransomware payload is highly configurable. The Rust version, in particular, allows affiliates to customize which processes to terminate, services to stop, and files/directories to include or exclude from encryption. This level of customization helps the malware evade detection and cause maximum disruption.
  • Targeting Backups: The malware actively seeks to disable or delete backups and shadow copies to prevent easy recovery (T1490 - Inhibit System Recovery).
  • Platform Versatility: The use of Go and Rust enables Qilin to target a wide array of systems. The ability to encrypt VMware ESXi servers is particularly damaging, as it can take entire virtualized environments offline with a single stroke.

Impact Assessment

For a company like Jayeff Construction, the impact of a Qilin ransomware attack is severe. Operations are likely halted due to encrypted systems, leading to project delays and financial losses. The exfiltration of data poses a long-term risk; this data could include sensitive project blueprints, financial records, employee information, and client data. The public listing on Qilin's leak site causes immediate reputational damage and could impact business relationships. The construction industry, like many others, relies on data for project management, bidding, and finance, making such an attack highly disruptive.

IOCs — Directly from Articles

No specific IOCs related to the Jayeff Construction attack were provided.

Cyber Observables — Hunting Hints

Security teams can hunt for generic Qilin TTPs:

  • Vulnerability Scanning: Proactively scan for and patch Fortinet vulnerabilities known to be exploited by Qilin, such as CVE-2024-21762.
  • PowerShell Activity: Qilin affiliates often use PowerShell for reconnaissance and lateral movement. Monitor for suspicious or obfuscated PowerShell scripts.
  • ESXi Logs: On VMware environments, monitor ESXi logs for unusual shell commands or file transfers, as this could indicate an attempt to deploy the Linux version of the ransomware.

Detection & Response

Detection:

  • EDR: Use EDR solutions with behavioral analytics to detect the execution of ransomware payloads, termination of security services, and deletion of shadow copies. This is a key application of D3-PA: Process Analysis.
  • Network Monitoring: Analyze network traffic for large, unexpected outbound data flows that could signal data exfiltration. Implement D3-NTA: Network Traffic Analysis to baseline normal traffic and alert on anomalies.

Response:

  1. Isolate compromised systems from the network to contain the infection.
  2. If ransomware has been deployed, activate the incident response plan and engage third-party experts if necessary.
  3. Do not power off encrypted ESXi hosts, as this can complicate forensic analysis. Instead, disconnect them from the network.
  4. Restore from known-good, offline backups.

Mitigation

  • Patch Management: Aggressively patch internet-facing infrastructure, especially VPNs and firewalls like Fortinet devices. This is a critical D3-SU: Software Update measure.
  • Immutable Backups: Maintain and regularly test immutable, air-gapped backups of all critical systems, including ESXi server configurations and virtual machines.
  • MFA Everywhere: Enforce multi-factor authentication on all remote access points, administrative accounts, and critical applications.
  • Network Segmentation: Segment the network to limit an attacker's ability to move laterally from an initial point of compromise.

Timeline of Events

1
May 1, 2026
The Qilin ransomware group lists Jayeff Construction as a victim on its data leak site.
2
May 2, 2026
This article was published

MITRE ATT&CK Mitigations

Aggressively patch internet-facing devices, particularly the Fortinet vulnerabilities known to be exploited by Qilin.

Maintain and test immutable, offline backups of critical systems, including virtual infrastructure like ESXi.

Enforce MFA on all remote access services to prevent credential-based takeovers.

Timeline of Events

1
May 1, 2026

The Qilin ransomware group lists Jayeff Construction as a victim on its data leak site.

Sources & References

Victim: Jayeff Construction
Ransomware.liveApril 30, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

QilinAgendaransomwareJayeff ConstructionRaaSFortinet

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.